{"posts":[{"id":"41003c81-0274-4c65-b809-1406a6ee8b73","web_title":"Are we post-CTF or is it simply time to rethink?","web_subtitle":"A retrospective on the CrikeyCon 11 CTF ","slug":"post-ctf-world","image_url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/f6b9779f-7d15-4e69-aded-4e23649078b3/hero-banner.png?t=1774246892","audience":"free","is_premium":false,"override_scheduled_at":"2026-03-23T06:36:40.293Z","estimated_reading_time":14,"estimated_reading_time_display":"14 minutes","comments_state":"default","created_at":"2026-03-23T03:12:20Z","updated_at":"2026-03-23T06:55:22Z","authors":[{"id":"339f3d98-4083-4a53-ac23-2f91be894b33","name":"Ben Gittins","profile_picture":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/headshot.jpg","thumb":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/thumb_headshot.jpg"},"landscape":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/landscape_headshot.jpg"}}}],"content_tags":[{"id":"376e07b8-76a1-4f91-9650-c07f9e49b97b","display":"AI","slug":"ai"},{"id":"dfdca211-0d4c-40cd-8d6e-0e2dcb6695cb","display":"CTF","slug":"ctf"}]},{"id":"19379632-17e2-4f6b-91cb-0a3db45af0a6","web_title":"Is AI security really different from ProdSec?","web_subtitle":"TLDR; The majority of AI security is product or application security fundamentals applied to a new context. ","slug":"is-ai-security-really-different-from-prodsec","image_url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/0b6fe38f-025c-405e-bee7-3f1bf839789d/NPM.jpg?t=1762834464","audience":"free","is_premium":false,"override_scheduled_at":"2025-11-11T04:37:34.453Z","estimated_reading_time":7,"estimated_reading_time_display":"7 minutes","comments_state":"default","created_at":"2025-11-05T01:06:58Z","updated_at":"2025-11-11T04:37:34Z","authors":[{"id":"339f3d98-4083-4a53-ac23-2f91be894b33","name":"Ben Gittins","profile_picture":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/headshot.jpg","thumb":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/thumb_headshot.jpg"},"landscape":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/landscape_headshot.jpg"}}}],"content_tags":[{"id":"376e07b8-76a1-4f91-9650-c07f9e49b97b","display":"AI","slug":"ai"}]},{"id":"1a4a2d22-4e54-4d67-a818-ba85d35d7f9b","web_title":"Practical short term steps for managing supply chain risk in JavaScript/Python","web_subtitle":"When it rains, it pours... too bad it has always been pouring in the NPM ecosystem","slug":"practical-steps-for-managing-supply-chain-risk-in-the-short-term","image_url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/e1fbddb8-eb5f-430b-b9a8-f4f4f700e408/NPM.png?t=1758070227","audience":"free","is_premium":false,"override_scheduled_at":"2025-09-18T02:12:45.265Z","estimated_reading_time":9,"estimated_reading_time_display":"9 minutes","comments_state":"default","created_at":"2025-09-17T00:37:38Z","updated_at":"2025-09-18T09:56:54Z","authors":[{"id":"339f3d98-4083-4a53-ac23-2f91be894b33","name":"Ben Gittins","profile_picture":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/headshot.jpg","thumb":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/thumb_headshot.jpg"},"landscape":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/landscape_headshot.jpg"}}}],"content_tags":[{"id":"f1dc3332-1c1b-4720-93ec-649d59a9d1e7","display":"Supply Chain","slug":"supply-chain"}]},{"id":"d24d0e0d-cb75-47c3-8b5e-fa4c36e1a071","web_title":"Pragmatic AppSec: Part 1 - A map that reflects the territory","web_subtitle":"Level 0 maturity","slug":"pragmatic-appsec-part-1-a-map-that-reflects-the-territory","image_url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/af7e9d46-fa3d-403c-8a9a-35792472f3d8/Map.png?t=1757651165","audience":"free","is_premium":false,"override_scheduled_at":"2025-09-12T04:47:31.111Z","estimated_reading_time":9,"estimated_reading_time_display":"9 minutes","comments_state":"default","created_at":"2025-09-10T21:27:18Z","updated_at":"2025-09-12T05:24:22Z","authors":[{"id":"339f3d98-4083-4a53-ac23-2f91be894b33","name":"Ben Gittins","profile_picture":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/headshot.jpg","thumb":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/thumb_headshot.jpg"},"landscape":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/landscape_headshot.jpg"}}}],"content_tags":[{"id":"d6f00637-7d06-4166-ad57-47142372f06a","display":"Pragmatic AppSec","slug":"pragmatic-appsec"}]},{"id":"6cd187cb-6073-42a8-bf31-18e7c029d80e","web_title":"Don't forget to do your damn job and tell people about it","web_subtitle":"Remember to actually do what you need to do","slug":"don-t-forget-to-do-your-damn-job-and-tell-people-about-it","image_url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/2d75a0cf-ac83-4fa4-aa86-09a268a6f3d0/damnjob.png?t=1757379226","audience":"free","is_premium":false,"override_scheduled_at":"2025-08-14T14:00:00.000Z","estimated_reading_time":5,"estimated_reading_time_display":"5 minutes","comments_state":"default","created_at":"2025-09-09T00:52:17Z","updated_at":"2025-09-10T00:15:04Z","authors":[{"id":"339f3d98-4083-4a53-ac23-2f91be894b33","name":"Ben Gittins","profile_picture":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/headshot.jpg","thumb":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/thumb_headshot.jpg"},"landscape":{"url":"https://beehiiv-images-production.s3.amazonaws.com/uploads/user/profile_picture/339f3d98-4083-4a53-ac23-2f91be894b33/landscape_headshot.jpg"}}}],"content_tags":[{"id":"62b98612-bbb0-4780-9299-6697040cac37","display":"People and Processes","slug":"people-and-processes"}]}],"pagination":{"page":1,"per_page":30,"total":5,"total_pages":1,"ids":null}}