Catalyst Blog
Featured Post
SEARCH & FILTER
More From The Blog
Search for
Category
More Tests, More Problems: Rethinking AI-Driven Test Generation
Generative AI is transforming software development faster than any technology…
Obi-Wan Kenobi’s Guide to Application Security
“That’s no moon. It’s a space station.” With those six…
Arming ARM Protection: ARM-based Arm Wrestling
Auspiciously Aggravating ARM Attackers A few years ago, Apple released…
The Real ROI of AI Starts Inside the Workflow
Productivity gains help individuals. Agentic AI is what strengthens alignment,…
Dopamine & Dopamine-RootHide: The Myth of the Undetectable Jailbreak
Recent jailbreak releases such as Dopamine 2.4.x and its fork…
How Conflicting Security Directives Can Leave You Without Any Oxygen
If HAL-9000 Didn’t Read Lips, Dave Bowman Wouldn’t Have Had…
Securing AI-Generated Code with Digital.ai Release
Introduction: AI Code Security and Its Emerging Risks Large Language…
Why Your Security Stack is Like Baking Cookies at 10,000 Feet (And How to Stop Them From Falling Flat)
Last weekend, I spent three hours trying to bake the…
The Return to Bare Metal: Why We’re Done Pretending
For the better part of two decades, we’ve been sold…