2026  19

March  19

A CFA Charterholder Built an ML Fraud Detector: Here’s What the Models Miss

March 19, 2026 · 4 min · Rex Coleman

AI Security Has a Shipping Problem

March 19, 2026 · 5 min · Rex Coleman

Apply Adversarial Control Analysis to Your ML System in 3 Steps

March 19, 2026 · 7 min · Rex Coleman

Build Your Own ML Vuln Prioritizer

March 19, 2026 · 8 min · Rex Coleman

govML Quickstart: Governed ML in 15 Minutes

March 19, 2026 · 6 min · Rex Coleman

How to Detect Backdoored ML Models Without Labeled Examples

March 19, 2026 · 9 min · Rex Coleman

How to Red-Team Your AI Agent in 1 Hour

March 19, 2026 · 9 min · Rex Coleman

I Built a PQC Migration Scanner: Here’s What Your Codebase Is Hiding

March 19, 2026 · 4 min · Rex Coleman

Prompt Injection Is Yesterday’s Threat. RL Attacks Are Next.

March 19, 2026 · 6 min · Rex Coleman

The Agent Security Gap Nobody’s Talking About: Skills Run Every Heartbeat

March 19, 2026 · 6 min · Rex Coleman

Why AI-Powered Attacks Need Architecture-Level Defense

March 19, 2026 · 6 min · Rex Coleman

How to Secure Your OpenClaw in 30 Minutes

March 17, 2026 · 8 min · Rex Coleman

Beyond Prompt Injection: RL Attacks on AI Agent Decision-Making

March 16, 2026 · 5 min · Rex Coleman

Antivirus for AI Models: Behavioral Fingerprinting Detects What Static Analysis Misses

March 16, 2026 · 6 min · Rex Coleman

I Red-Teamed AI Agents: Here’s How They Break (and How to Fix Them)

March 16, 2026 · 6 min · Rex Coleman

One Principle, Six Domains: Adversarial Control Analysis for AI Security

March 16, 2026 · 4 min · Rex Coleman

Adversarial ML on Network Intrusion Detection: What Adversarial Control Analysis Reveals

March 14, 2026 · 5 min · Rex Coleman

How I Govern AI-Assisted ML Projects

March 14, 2026 · 6 min · Rex Coleman

Why CVSS Gets It Wrong: ML-Powered Vulnerability Prioritization

March 14, 2026 · 6 min · Rex Coleman
© 2026 Rex Coleman. Content under CC BY 4.0. Code under MIT. Singularity · GitHub · LinkedIn