How to read more security + engineering booksAnd some book recommendations for 2022–23Aug 25, 2023A response icon10Aug 25, 2023A response icon10
Writing Secure GPT PromptsPrompt engineering: learning to write robust and secure promptsAug 2, 2023A response icon1Aug 2, 2023A response icon1
Why is Copilot giving me bad codeExploring security issues in code generation LLM toolsJun 27, 2023A response icon1Jun 27, 2023A response icon1
Hacking LLMs with prompt injectionsAnd ways hackers can attack GPT-based applicationsJun 1, 2023A response icon5Jun 1, 2023A response icon5
Tech Writing vs GPTIs AI replacing technical writers and developer advocates?Apr 13, 2023A response icon1Apr 13, 2023A response icon1
Published inBetter ProgrammingChatGPT: Build me a Recon Tool!Using ChatGPT to build a simple hacking recon toolMar 30, 2023A response icon5Mar 30, 2023A response icon5
Published inBetter ProgrammingThoughts on the Book, “Designing Secure Software: A Guide for DevelopersAppSec engineer’s book club #001 — discussing Loren Kohnfelder’s bookJan 10, 2023Jan 10, 2023
Published inBetter ProgrammingSameSite Cookie AttacksAnd what subdomain takeovers mean for your SameSite cookiesJun 15, 2022A response icon5Jun 15, 2022A response icon5
Published inShiftLeft BlogSecurity and privacy in a world of digital identityInterview with Shinesa Cambric, Principal Product Manager at MicrosoftApr 20, 2022A response icon3Apr 20, 2022A response icon3
Published inShiftLeft BlogBreaking the entry-level barrier with Jasmine JacksonLaunching your career in cybersecurity with self-studyApr 14, 2022Apr 14, 2022