Teaching Defensive AI to Think Like a Red Team
A walkthrough of how I architected multi-agent simulations that pit autonomous attackers against defensive RL policies to harden enterprise networks.
Deep dives on reinforcement learning, intent-aware defence, and the architectural decisions powering projects like pentestMCP and North-Star.
Breaking down the architecture decisions that let pentestMCP compose reconnaissance, exploitation, and reporting without drowning operators in noise.
How graph neural networks can identify coordinated botnet behaviour across distributed IoT devices by modelling communication patterns as spatial-temporal graphs.
How we built North-Star, an interpretable ML pipeline that helps astronomers understand why a model flags a star system as hosting exoplanets.
A practical guide to implementing zero-trust principles in Kubernetes clusters, from network policies to runtime threat detection.
Exploring prompt injection, data poisoning, and model extraction attacks against LLMs—plus practical mitigations for production deployments.