Blog
Research, tutorials, and insights on Kubernetes, CI/CD, and cloud security
Agentic AI Deals: M&A, Acquisitions, and VC Funding (Jan-Mar 2026)
Tracking the money: Nvidia sees $1T in orders, AMI Labs raises record $1.03B seed, OpenAI targets Q4 IPO, Netflix acquires InterPositive for $600M, robotics raises $1.2B in one week, cloud capex hits $700B
AI Security Roundup: LLM, MCP, RAG, and Agentic Vulnerabilities (Mar 19, 2026)
Meta AI agent acts without permission in production, vLLM video RCE (CVE-2026-22778), HackerBot-Claw targets GitHub, OWASP expands agentic frameworks for RSAC, Palo Alto announces secure AI factories, Check Point launches AI advisory board, Fortinet FortiOS 8.0 with shadow AI detection
Agentic AI this week (Mar 12 - Mar 19, 2026)
Weekly roundup: Nvidia GTC 2026 unveils Vera Rubin and $1T in orders, Meta AI agent acts without permission, Yann LeCun raises $1B seed for AMI Labs, Mistral ships Small 4, EU Council delays AI Act, 67% of Fortune 500 running production agents
Why Agent Roles Should Be Separated in AI Systems
Context shapes reasoning. An agent that reads security research may absorb its framing and logic, influencing how it plans and acts. That is why role separation is becoming a security pattern for agentic AI.
MCP Composition Scanner: Detecting Emergent Security Risks in Multi-Server Agent Ecosystems
Introducing the first cross-server MCP capability composition analyzer - detecting risks invisible to individual server reviews when frontier models chain tools across server boundaries
The WAF Is Dead. Long Live⦠What Exactly?
Why the Web Application Firewall model is failing the modern application landscape, and what security leaders should be rethinking
Kubernetes Gateway API Tutorial
A complete hands-on guide to deploying the Kubernetes Gateway API with Envoy Gateway on a local KIND cluster using Cilium CNI
From LLM Playground To Enterprise Control Plane
Why AI Gateways, MCP Registries and Kubernetes Are Becoming The Agentic Foundation
The Agentic AI Inflection Point
A simple Google ADK Penetration Testing Agent using Sequential Thinking and MCP
The Capability Delta: When AI Agents Outgrow Their Sandboxes
Exploring the hidden gap between an agent's declared tool set and its effective real-world power once reasoning, chaining, and environment access come into play
Exploiting applications using liveness probes in Kubernetes
Security implications of Kubernetes liveness, readiness and startup probes
How to TCPdump using ephemeral containers in Kubernetes (part 3)
Using ephemeral debug containers to run tcpdump without restarting pods
How to TCPdump effectively in Kubernetes (part 2)
Using hostNetwork pods to capture traffic on Kubernetes nodes without SSH access
How to TCPdump effectively in Kubernetes (part 1)
Using kubectl patch to add a tcpdump sidecar container to existing deployments
How to TCPdump effectively in Docker
Learn how to capture network traffic from Docker containers using TCPdump by linking to container network stacks