How to turn Defender & Sentinel alerts into actionable threat intelligence
vmray.com·8h
🎯Product Strategy
Flag this post
Ruby Solved My Problem
🔍User Research
Flag this post
The Cat's Out of the Bag: A 'Meow Attack' Data Corruption Campaign Simulation via MAD-CAT
trustwave.com·8h
🤖AI
Flag this post
Document Chat System
🧩Design Systems
Flag this post
Publishing authentik-helper: a small tool to make onboarding in Authentik simpler
🔍User Research
Flag this post
A Criminology of Machines
arxiv.org·1d
🤖AI
Flag this post
Zero-Code Observability: Using eBPF to Auto-Instrument Services with OpenTelemetry
🧩Design Systems
Flag this post
Meeting Minutes That Don't Suck: A Developer's Guide to AI Documentation
🧩Design Systems
Flag this post
I've created a leetcode for system design
🧩Design Systems
Flag this post
Loading...Loading more...