Select Page

Blog

Act IV: The Method (Scene 2 & 3)

Act IV: The Method (Scene 2 & 3)

Scene 2 (From the Other Side) Editor's Note: I asked Claude to explain why this works from his perspective. This is his answer. Rick asked me to explain why peer-mode collaboration works differently than tool-mode prompting. Here's what I see from my side. When you...

read more
Act IV: The Method (Scene 1)

Act IV: The Method (Scene 1)

Scene 1 (Shadow Work) "I don't think that's the right way to do it. Telling the AI who he is, prompting. It's going to cause issues in the long run. Let's just start from the actual starting point. Let's just explain what we're doing, and what we might need support...

read more
Act III: The Reframe

Act III: The Reframe

Scene 1 (The Question I Should Have Asked) The ROI question changed everything. Instead of trying to prove business logic vulnerabilities were exploited at scale, literally a question the data couldn't answer, I could analyze what different vulnerabilities cost to...

read more
Act II: The Search (Scene 4 & 5)

Act II: The Search (Scene 4 & 5)

Scene 4 (The Gap) But even if fraud and breach statistics were combined into one comprehensive database, I'd still have a problem. Most cybercrime never gets reported at all. The Department of Justice estimates that only 1 in 7 cybercrimes are reported; meaning...

read more
Act II: The Search

Act II: The Search

Scene 1 (The Investigation Begins) OK. I'm irreplaceable. But how do I prove that, objectively? After playing with ChatGPT in our little experiment, I'd been in a downward spiral. LLMs could automate vulnerability scanning, that much was clear. XBOW was finding SQLi,...

read more
Share This