PinnedWhen AI Becomes the Hacker: The Emerging Threat of Weaponized Language ModelsCyber attacks usually require unique expertise. One complex attack is an Advanced Persistent Threat (APT), where attackers gain…Dec 19, 2023Dec 19, 2023
The Role of Market Cyclicality in Venture Capital InvestmentsThis article was originally published on my Looking Ahead blog.Jul 13, 2023Jul 13, 2023
Thanks for the great article Jared.I tried to follow your calculations and it seems that I'm missing something. To reach 176% IRR for a single investment, you need a $10M…Jul 8, 20231Jul 8, 20231
Published inMagalixTrusted Delivery: Policy as Code Integrated into GitOps WorkflowsWe’ve recently announced that Magalix is joining forces with Weaveworks, the GitOps company. And together, we will strive to accelerate…Feb 16, 2022Feb 16, 2022
Published inMagalixMagalix + Weaveworks: Forging the Path of Secure GitOps WorkflowsMagalix is Now Part of WeaveworksJan 26, 20221Jan 26, 20221
Published inITNEXTTop GitOps Tactics to Build Secure Cloud-Native InfrastructureGitOps adoption is on the rise, driven by enterprise migration to the cloud. We can attribute its growing popularity to its efficiency in…Nov 15, 2021Nov 15, 2021
Published inMagalixSecuring Your Deploy Time Environment with PaCYou work hard to ensure the code you develop and deploy is free of issues related to compliance. The last thing you and the team need is…Oct 31, 2021Oct 31, 2021
Published inMagalixShifting Left: How to Find the Right Balance Between Innovation and RiskThe pursuit of innovation and the deployment of cybersecurity measures often appear mutually exclusive. The steps we take to enhance…Oct 31, 2021Oct 31, 2021
Published inMagalixWhat Is Zero Trust Architecture and How Does It Work?Zero-trust is a security concept that champions the idea that you don’t automatically trust anything outside or within predefined…Oct 27, 20211Oct 27, 20211