Blog
Act IV: The Method (Scene 2 & 3)
Scene 2 (From the Other Side) Editor's Note: I asked Claude to explain why this works from his perspective. This is his answer. Rick asked me to explain why peer-mode collaboration works differently than tool-mode prompting. Here's what I see from my side. When you...
Act IV: The Method (Scene 1)
Scene 1 (Shadow Work) "I don't think that's the right way to do it. Telling the AI who he is, prompting. It's going to cause issues in the long run. Let's just start from the actual starting point. Let's just explain what we're doing, and what we might need support...
Act III: The Reframe
Scene 1 (The Question I Should Have Asked) The ROI question changed everything. Instead of trying to prove business logic vulnerabilities were exploited at scale, literally a question the data couldn't answer, I could analyze what different vulnerabilities cost to...
Act II: The Search (Scene 4 & 5)
Scene 4 (The Gap) But even if fraud and breach statistics were combined into one comprehensive database, I'd still have a problem. Most cybercrime never gets reported at all. The Department of Justice estimates that only 1 in 7 cybercrimes are reported; meaning...
Act II: The Search
Scene 1 (The Investigation Begins) OK. I'm irreplaceable. But how do I prove that, objectively? After playing with ChatGPT in our little experiment, I'd been in a downward spiral. LLMs could automate vulnerability scanning, that much was clear. XBOW was finding SQLi,...