PinnedMohamed AhmedWhen AI Becomes the Hacker: The Emerging Threat of Weaponized Language ModelsCyber attacks usually require unique expertise. One complex attack is an Advanced Persistent Threat (APT), where attackers gain…·12 min read·Dec 19, 2023----
Mohamed AhmedThe Role of Market Cyclicality in Venture Capital InvestmentsThis article was originally published on my Looking Ahead blog.·6 min read·Jul 13, 2023----
Mohamed AhmedThanks for the great article Jared.I tried to follow your calculations and it seems that I'm missing something. To reach 176% IRR for a single investment, you need a $10M…1 min read·Jul 8, 2023--1--1
Mohamed AhmedinMagalixTrusted Delivery: Policy as Code Integrated into GitOps WorkflowsWe’ve recently announced that Magalix is joining forces with Weaveworks, the GitOps company. And together, we will strive to accelerate…·6 min read·Feb 16, 2022----
Mohamed AhmedinMagalixMagalix + Weaveworks: Forging the Path of Secure GitOps WorkflowsMagalix is Now Part of Weaveworks·4 min read·Jan 26, 2022--1--1
Mohamed AhmedinITNEXTTop GitOps Tactics to Build Secure Cloud-Native InfrastructureGitOps adoption is on the rise, driven by enterprise migration to the cloud. We can attribute its growing popularity to its efficiency in…·5 min read·Nov 15, 2021----
Mohamed AhmedinMagalixSecuring Your Deploy Time Environment with PaCYou work hard to ensure the code you develop and deploy is free of issues related to compliance. The last thing you and the team need is…·5 min read·Oct 31, 2021----
Mohamed AhmedinMagalixShifting Left: How to Find the Right Balance Between Innovation and RiskThe pursuit of innovation and the deployment of cybersecurity measures often appear mutually exclusive. The steps we take to enhance…·5 min read·Oct 31, 2021----
Mohamed AhmedinMagalixWhat Is Zero Trust Architecture and How Does It Work?Zero-trust is a security concept that champions the idea that you don’t automatically trust anything outside or within predefined…·5 min read·Oct 27, 2021--1--1