Links
AddNote: If this topic has peaked your interest, you can join me for a Webinar on August 15 where Iβll dive deep into Cloud Native Operations with Kubernetes and CI/CD Pipelines. Introduction Welcome to a three part blog series on Creating a Helm Chart Repository. In part 1 I will demonstrate creating a Helm chart repository using GitHub and GitHub Pages. In part 2 I will add Automation to automatically update the repository, and in part 3 I will add testing for changes to the charts themselves.
The unified interface for LLMs. Find the best models & prices for your prompts
GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.
Open-source BI for engineers. Contribute to quarylabs/quary development by creating an account on GitHub.
On July 14th, 2025, Cloudflare made a change to our service topologies that caused an outage for 1.1.1.1 on the edge, resulting in downtime for 62 minutes for customers using the 1.1.1.1 public DNS Resolver as well as intermittent degradation of service for Gateway DNS.
Weβre deeply sorry for this outage.
This outage was the result of an internal configuration error and not the result of an attack or a BGP hijack. In this blog post, weβre going to talk about what the failure was, why it occurred, and what weβre doing to make sure this doesnβt happen again.
USB-C aimed to unify charging and data, but years later, compatibility problems and complex specs make it a headache for consumers worldwide.
Diagram as Code Tool Written in Rust with Draggable Editing - RohanAdwankar/oxdraw
Free domain research tool to discover hosts related to a domain. Find visible hosts from the attackers perspective for Red and Blue Teams.
Hereβs a quick guide on the advantages of using GitHub Actions as your preferred CI/CD toolβand how to build a CI/CD pipeline with it.
I work from home everyday, I am susceptible to eye strain, eye pain, and dizziness. Having a working environment thatβs as easy on my eyes as possible is of critical importance. I'd like to share what I've learned over the years in hopes that it can be helpful to you if you work from home, and like many, have experienced WFH eye strain.
In the final section of my series on creating a comprehensive security program around Docker [https://nullsweep.com/building-a-docker-security-program], I'll be looking at some ideas and best practices around patching running containers.
In the previous articles, I talked about running static analysis on containers [https://nullsweep.com/docker-static-analysis-with-clair] and rolling
BookLore is a self-hosted app for managing and reading books & comics (PDF, EPUB, CBZ) with metadata editing, OPDS, reading progress, and multi-user support. - booklore-app/BookLore
A genuine RAAF-built World War II bunker β once used by US forces β has hit the market near Brisbane, boasting 30cm-thick concrete walls and the ultimate weird home bragging rights.
Computers are starting to have opinions on how our APIs should look like
On April 21, 2026, a major breakthrough in cybersecurity happened: leading standardization initiatives gathered in Washington DC and agreed to begin coordinating collectively on AI security. A personal dream come true. The result: MOSAIC: Multi-Organization Secure AI Coordination. The goal: turn a fragmented landscape into clear, consistent standards and guidelines, to deal with the mounting risks of AI.
This important step was taken at the AI Security Policy Forum, organised and led by the OWASP AI Exchange, with SANS Institute as co-host - convening standard makers and policy stakeholders.
The initiatives at the table included: π BIML (Berryville Institute of Machine Learning) π Center for Internet Security (CIS) π Cloud Security Alliance (CSA) π Coalition for Secure AI (CoSAI) π National Institute of Standards and Technology (NIST) π OWASP AI Exchange (AIX) π OWASP GenAI Security Project π SANS Institute
The group agreed that it is now more important than ever to coordinate around the rapidly evolving possibilities and challenges of AI, as AI security risks mount.
One of the next steps is to provide a standardized map of the participating initiatives and a communication platform to exchange insights on a first list of identified topics (e.g., aligning with other initiatives such as SC42, building on OpenCRE, consensus on definitions), improve consistency, clarity, quality, and prevent unnecessary duplication. The idea is to move fast while maintaining independence and with lightweight coordination - not add more committees.
In addition to the organizations mentioned, the discussion also included journalists, representatives from International Telecommunication Union (ITU), The Aspen Institute, academia, and government β providing valuable perspectives on developments in both policy and industry. This helped prioritize the topics to focus on.
In the picture, from left to right, standing to sitting: Disesdi Shoshana Cox (AIX), Gary McGraw(BIML), Rob van der Veer (AIX), Anonymous, Duncan Sparrell, John Yeoh (CSA), Rock Lambros (GenAI), Norma Krayem, Brian Calkin (CIS), Matt Altomare (Aspen), Omar Santos (CoSAI), Aruneesh Salhotra (AIX), Jonathan Gibson (The Dispatch), Apostol Vassilev (NIST), Rhea Nygard, Ken Huang, Lav Varshney (Stony Brook University), Sounil Yu, and Sharon Goldman (Fortune)
Not in the picture, but involved, in alphabetical order: Rob T. Lee (SANS), Ryan Galluzzo (NIST), Soribel F.
A big thank you to: π Disesdi Shoshana CoxΒ for her idea to bring everybody together in a room to fulfil the connecting mission of the Exchange π The amazing thinktank at the AI Exchange π Spyros Gasteratos for his work on OpenCRE π Violeta Klein, CISSP, CEFA for shaping the story for the Forum π Straiker, Casco (YC X25), AI Security Academy, and SANS for supporting the Forum. π Software Improvement Group for donating the original threat model and initiating the AI Exchange
Letβs make AI a success! | 28 comments on LinkedIn