<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator><link href="https://ramimac.me/feed.xml" rel="self" type="application/atom+xml" /><link href="https://ramimac.me/" rel="alternate" type="text/html" /><updated>2026-04-15T11:15:31+00:00</updated><id>https://ramimac.me/feed.xml</id><title type="html">High Signal Security</title><subtitle>Cloud security research and engineering insights by Rami McCarthy.</subtitle><author><name>ramimac</name></author><entry><title type="html">Research ROI: Researching Red Oceans</title><link href="https://ramimac.me/red-oceans" rel="alternate" type="text/html" title="Research ROI: Researching Red Oceans" /><published>2026-04-07T08:00:00+00:00</published><updated>2026-04-07T08:00:00+00:00</updated><id>https://ramimac.me/red-oceans</id><content type="html" xml:base="https://ramimac.me/red-oceans"><![CDATA[<p>Should you research what everyone else is researching? In security, the instinct is to find the novel “blue” ocean. But sometimes the most impactful work happens in crowded spaces.</p>

<p class="notice--info">Check out my prior entries in this series: <a href="/floors-and-ceilings">Research ROI: Floors &amp; Ceilings</a> &amp; <a href="/problem-scope-impact">Research ROI: Problem, Scope, Impact</a></p>

<p>I recently read the Harvard Business School <a href="https://www.hbs.edu/faculty/Pages/item.aspx?num=68375">Case Study on Wiz</a>. One aside caught my eye:</p>

<blockquote>
  <p>In the early decision to pivot to a cloud security product, the Wiz team also effectively decided to
enter an existing market, rather than try to create a market around a new product. The move “to a red
ocean strategy was counterintuitive,” Herzberg said.</p>
</blockquote>

<p>A <a href="https://www.blueoceanstrategy.com/tools/red-ocean-vs-blue-ocean-strategy/">Red Ocean strategy</a> involves:</p>
<ul>
  <li>Competing in existing market space</li>
  <li>Beating the competition</li>
  <li>Exploiting existing demand</li>
  <li>Making the value-cost trade-off</li>
  <li>Aligning the whole system of a firm’s activities with its strategic choice of differentiation or low cost</li>
</ul>

<p>It struck me that Red Oceans abound in security research. Just in recent history, I’ve seen froth around:</p>
<ul>
  <li><a href="https://github.com/openclaw/openclaw/security">vulnerabilities in openclaw</a></li>
  <li>prompt injection</li>
  <li>vulnerable and <a href="https://opensourcemalware.com/?search=%23ai-skill">malicious Agent Skills</a></li>
  <li>malicious <code class="language-plaintext highlighter-rouge">npm</code> packages</li>
  <li>public exposure of MCP servers</li>
  <li>malicious models on Hugging Face</li>
  <li>the evergreen idea of “a ton of secrets leaked in location Y” (h/t <a href="https://trufflesecurity.com/blog">Truffle</a>)</li>
</ul>

<p>These Red Oceans tend to snowball. One researcher inspires another to look at the same problem, or one just barely adjacent. Companies who focus on marketing-driven-research<sup id="fnref:1"><a href="#fn:1" class="footnote" rel="footnote" role="doc-noteref">1</a></sup> jump in. Vendors publish derivative works - with or without citation. The regular characters push FUD: to boost their profile, sell you something, or just because <strong>they don’t know any better</strong>.</p>

<p>That being said, these research oceans are red for a reason! There is chum in the water.</p>

<p>So, how can you responsibly and successfully navigate researching in a red ocean?</p>

<p>There are two tricks.</p>

<p>The first is to identify if you have something to add by diving in. This can fall into a few categories:</p>
<ol>
  <li>Ability to scale beyond state of the art. For example, expanding piecemeal research like malicious skills to an entire ecosystem.</li>
  <li>A unique perspective, often the intersection of your expertise with details. For example, applying a strong malware detection engine to a new class of tool.</li>
  <li>A differentiated right to win, often based on unique data or unique capabilities. For example, <a href="https://www.wiz.io/blog/widespread-npm-supply-chain-attack-breaking-down-impact-scope-across-debug-chalk">reviewing prevalence of a supply chain attack against representative data</a>. Or using long-term data collection to perform unique retrospective analysis.</li>
  <li>A compelling narrative, often focused on real world impact versus abstract risk. For example, I worked on a project where we investigated the venn diagram of secrets and AI <a href="https://www.wiz.io/blog/forbes-ai-50-leaking-secrets">through the lens of the AI Top 50</a>. The mechanics of the research were simple, but the target scope drove meaningful analysis and industry influence. We identified the patterns of secrets leakage in AI, and were able to identify major gaps in secrets tool coverage.</li>
</ol>

<p>The second trick is executing with integrity once you’ve decided to wade in:</p>
<ol>
  <li>Cite generously, both your inspirations and high quality adjacent research. Do good enough work that citation doesn’t fuel insecurity.</li>
  <li>Find opportunities to collaborate, instead of duplicating work.</li>
  <li>Focus on actionable guidance, and progressing the industry. Make sure you answer the implicit question of “so what”</li>
</ol>

<h2 id="the-roi-of-red-oceans">The ROI of Red Oceans</h2>

<p>Red oceans offer an opportunity for differentiation. They also offer a chance to work in conversation with competitors and the industry. The built-in audience and proven market demand mean your research can have immediate impact, but only if you bring unique value.</p>

<p>The trick is to avoid low leverage follow-on research, and instead respond to the existing hype and demand with differentiated work. Know what you’re adding, execute with integrity, and focus on moving the industry forward.</p>

<p>Sometimes the best research isn’t about finding a novel lane, but about swimming smarter in a crowded one.</p>

<div class="footnotes" role="doc-endnotes">
  <ol>
    <li id="fn:1">
      <p>As opposed to the vastly superior research-driven-marketing. <a href="#fnref:1" class="reversefootnote" role="doc-backlink">&#8617;</a></p>
    </li>
  </ol>
</div>]]></content><author><name>ramimac</name></author><category term="security" /><category term="research" /><category term="leadership" /><summary type="html"><![CDATA[It often feels like everyone researches the same thing. Here's how you can swim in red oceans.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-04-07-red-oceans.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-04-07-red-oceans.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Six Accounts, One Actor: Inside the prt-scan Supply Chain Campaign</title><link href="https://ramimac.me/prt-scan-campaign" rel="alternate" type="text/html" title="Six Accounts, One Actor: Inside the prt-scan Supply Chain Campaign" /><published>2026-04-04T14:00:00+00:00</published><updated>2026-04-04T14:00:00+00:00</updated><id>https://ramimac.me/prt-scan-campaign</id><content type="html" xml:base="https://ramimac.me/prt-scan-campaign"><![CDATA[]]></content><author><name>ramimac</name></author><category term="security" /><category term="syndicated" /><category term="supply-chain" /><summary type="html"><![CDATA[Deep dive into TeamPCP's prt-scan infrastructure, revealing six coordinated accounts behind the ongoing supply chain campaign.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-04-04-prt-scan-campaign.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-04-04-prt-scan-campaign.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Move Fast and Break Things: 10 in 20</title><link href="https://ramimac.me/2026/03/26/2026-03-26-move-fast-and-break-things-10-in-20/" rel="alternate" type="text/html" title="Move Fast and Break Things: 10 in 20" /><published>2026-03-26T14:00:00+00:00</published><updated>2026-03-26T14:00:00+00:00</updated><id>https://ramimac.me/2026/03/26/2026-03-26-move-fast-and-break-things-10-in-20</id><content type="html" xml:base="https://ramimac.me/2026/03/26/2026-03-26-move-fast-and-break-things-10-in-20/"><![CDATA[]]></content><author><name>ramimac</name></author><category term="talks" /><summary type="html"><![CDATA[Sharing 10 AI experiments and the lessions Builders &amp; Breakers - Stockholm, 03/26/2026]]></summary></entry><entry><title type="html">Three’s a Crowd: TeamPCP Trojanizes LiteLLM in Continuation of Campaign</title><link href="https://ramimac.me/teampcp-litellm" rel="alternate" type="text/html" title="Three’s a Crowd: TeamPCP Trojanizes LiteLLM in Continuation of Campaign" /><published>2026-03-24T14:00:00+00:00</published><updated>2026-03-24T14:00:00+00:00</updated><id>https://ramimac.me/teampcp-litellm</id><content type="html" xml:base="https://ramimac.me/teampcp-litellm"><![CDATA[]]></content><author><name>ramimac</name></author><category term="security" /><category term="syndicated" /><category term="supply-chain" /><summary type="html"><![CDATA[TeamPCP trojanizes LiteLLM, continuing their coordinated supply chain campaign. Technical analysis and detection guidance.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-03-24-teampcp-litellm.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-03-24-teampcp-litellm.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">KICS GitHub Action Compromised: TeamPCP Strikes Again in Supply Chain Attack</title><link href="https://ramimac.me/kics-compromised" rel="alternate" type="text/html" title="KICS GitHub Action Compromised: TeamPCP Strikes Again in Supply Chain Attack" /><published>2026-03-23T14:00:00+00:00</published><updated>2026-03-23T14:00:00+00:00</updated><id>https://ramimac.me/kics-compromised</id><content type="html" xml:base="https://ramimac.me/kics-compromised"><![CDATA[]]></content><author><name>ramimac</name></author><category term="security" /><category term="syndicated" /><category term="supply-chain" /><summary type="html"><![CDATA[TeamPCP expands their campaign to KICS GitHub Action. Analysis of the attack chain, IOCs, and recommended actions.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-03-23-kics-compromised.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-03-23-kics-compromised.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Trivy Compromised: Everything You Need to Know about the Latest Supply Chain Attack</title><link href="https://ramimac.me/trivy-compromised" rel="alternate" type="text/html" title="Trivy Compromised: Everything You Need to Know about the Latest Supply Chain Attack" /><published>2026-03-20T14:00:00+00:00</published><updated>2026-03-20T14:00:00+00:00</updated><id>https://ramimac.me/trivy-compromised</id><content type="html" xml:base="https://ramimac.me/trivy-compromised"><![CDATA[]]></content><author><name>ramimac</name></author><category term="security" /><category term="syndicated" /><category term="supply-chain" /><summary type="html"><![CDATA[TeamPCP compromises Trivy GitHub Action, leaking CI/CD secrets. Detection guidance, IOCs, and mitigation steps for affected organizations.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-03-20-trivy-compromised.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-03-20-trivy-compromised.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Research ROI: Problem, Scope, Impact</title><link href="https://ramimac.me/problem-scope-impact" rel="alternate" type="text/html" title="Research ROI: Problem, Scope, Impact" /><published>2026-03-17T15:00:00+00:00</published><updated>2026-03-17T15:00:00+00:00</updated><id>https://ramimac.me/problem-scope-impact</id><content type="html" xml:base="https://ramimac.me/problem-scope-impact"><![CDATA[<p><em>Problem selection, project scoping, and operationalizing impact. Three skills for maximizing research ROI.</em></p>

<p class="notice--info">Check out my prior entry in this series: <a href="/floors-and-ceilings">Research ROI: Floors &amp; Ceilings</a></p>

<p>This time, I want to share the framework I lean on when trying to coach researchers in maximizing ROI. The framework exists to cut through the vagaries of “this had insufficient impact” feedback. Chase ROI responsibly by decomposing the skills necessary: Problem Selection, Project Scoping, &amp; Operationalizing Impact.</p>

<h2 id="problem-selection">Problem Selection</h2>

<p>In many ways, problem selection is the core “art” of Research. Picking high leverage, solvable problems is a matter of taste. However, there are still techniques for improving problem selection. The start is a deep understanding of the domain and landscape. Pay attention to the firehose of information: industry publications, academic research, competitors, adjacent domains, new technologies and developments. In a team, the benefit is your overlapping points of view, lightening this load on any individual.</p>

<p>Porting research is a powerful technique. Consider the possible variants of any research you encountered. This can be application across domain, technology, or simply in a new context or against new data. There are whole genres of repeatable research, like <a href="https://www.wiz.io/blog/supply-chain-risk-in-vscode-extension-marketplaces">scanning marketplaces for secrets</a>.</p>

<p>Fundamentally, picking a research problem is a balance. The idea project involves:</p>
<ol>
  <li>Your interests and curiosity</li>
  <li>Your skills and comparative advantages, the work only you can do</li>
  <li>The risk landscape and gaps in existing research / literature</li>
  <li>The goals of your team and organization</li>
</ol>

<blockquote>
  <p>“What is the most important problem in your field, and why aren’t you working on it?”</p>
  <ul>
    <li><a href="https://nicholas.carlini.com/writing/2026/how-to-win-a-best-paper-award.html">Nicholas Carlini</a></li>
  </ul>
</blockquote>

<p>Cultivate a garden of interesting problems. Always keep a list of research ideas, and inspirational research. This can start as a simple bibliography or text document. If you think of a topic, or just a blog title, scribble it down. This compounds shockingly well.</p>

<h2 id="project-scoping">Project Scoping</h2>

<p>The next core element of successful research impact is to scope your work correctly. The ROI equation means that increased investment requires outsized return. As such, structuring your level of investment is essential. An amazing research outcome when delivered in a week may be a failure if it takes six months. This is without going into the timeliness component of research, where outcomes can be perishable.</p>

<p><a href="/floors-and-ceilings">Floors and ceilings</a> is one framework that can help in rightsizing research. Long-term research balance is also essential, mixing big swings on big problems with quick wins. Set exit criteria for research to lock in ROI at the right moment.</p>

<p>Managing your projects for efficiency is another key element. As one key approach, stolen from Kanban: limit work-in-progress to increase throughput.</p>

<h2 id="operationalizing-impact">Operationalizing Impact</h2>

<p>Finally, having selected an interesting problem and adequately scoping your approach, you also need to be proactive in setting up for success.</p>

<p>The foundation is identifying the beneficiaries of your research. Consider stakeholders, audience, and artifacts that will ensure your research generates impact. If you are struggling to define audience, there are safe defaults: your customer, your internal partners, or just your 6-months-ago self.</p>

<p>Ideally, research output should balance quality and quantity. Avoid sacrificing quality for quantity. Focus on hitting your floors; don’t lower them. Get work out the door, where you can analyze its impact.</p>

<p>Pair that with an understanding of possible vectors for impact, including:</p>
<ul>
  <li>influencing product direction - by proving the possible</li>
  <li>enabling new product capabilities</li>
  <li>upleveling the industry - by advancing the state of the art</li>
  <li>generating marketing opportunities</li>
  <li>resolving core industry risk - and responsibly disclosing</li>
  <li>identifying vulnerabilities and getting them resolved</li>
  <li>creating new frameworks for managing security</li>
</ul>

<p>Take the time after each effort to review and retro your impact. Research can be a hamster wheel, get off long enough to learn and continuously improve.</p>

<h2 id="putting-it-all-together">Putting It All Together</h2>

<p>This framework has served me well, although I’m continuously refining it. Regardless, it gives you a means to proactively and systematically plan for and assess research ROI.</p>

<p>How do you think about maximizing ROI? Do you have a framework you like? I’m always looking to diversify my own methods!</p>

<p><em>Interested in more internals of Industry Research? Check out my coworker Amitai Cohen’s brilliant collection of essays at <a href="https://amitaico.substack.com/">Rhythms of Research</a>.</em></p>]]></content><author><name>ramimac</name></author><category term="security" /><category term="research" /><category term="leadership" /><summary type="html"><![CDATA[Problem selection, project scoping, and operationalizing impact. Three skills for maximizing research ROI.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-03-17-problem-scope-impact.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-03-17-problem-scope-impact.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Zeal of the Convert: Taming Shai-Hulud with AI</title><link href="https://ramimac.me/2026/03/11/2026-03-11-zeal-of-the-convert-taming-shai-hulud-with-ai/" rel="alternate" type="text/html" title="Zeal of the Convert: Taming Shai-Hulud with AI" /><published>2026-03-11T14:00:00+00:00</published><updated>2026-03-11T14:00:00+00:00</updated><id>https://ramimac.me/2026/03/11/2026-03-11-zeal-of-the-convert-taming-shai-hulud-with-ai</id><content type="html" xml:base="https://ramimac.me/2026/03/11/2026-03-11-zeal-of-the-convert-taming-shai-hulud-with-ai/"><![CDATA[]]></content><author><name>ramimac</name></author><category term="talks" /><summary type="html"><![CDATA[2025 was the year of Shai-Hulud: a series of attacks leaking massive amounts of victim data onto GitHub, ungraciously scheduled for whenever I was trave&amp;hellip;]]></summary></entry><entry><title type="html">Research ROI: Floors &amp;amp; Ceilings</title><link href="https://ramimac.me/floors-and-ceilings" rel="alternate" type="text/html" title="Research ROI: Floors &amp;amp; Ceilings" /><published>2026-02-18T14:00:00+00:00</published><updated>2026-02-18T14:00:00+00:00</updated><id>https://ramimac.me/floors-and-ceilings</id><content type="html" xml:base="https://ramimac.me/floors-and-ceilings"><![CDATA[<p><em>Floors set the baseline. Ceilings align the moonshots. A framework for planning successful research.</em></p>

<p>How do you lead a Research team? Since <a href="/joining-wiz">joining Wiz</a>, I’ve moved into a role leading a small part of our Research Organization.</p>

<p>Wiz has obviously been a success, and Research has always held a core role. Leadership has valued it accordingly. There is no micro-focus on measuring and managing for Return on Investment. In my team, Risk Research, we have diverse stakeholders and impact, spanning Product, Engineering, customer-facing, and (yes) marketing.</p>

<p>However, despite the latitude we have for research that might be high-risk or long-horizon, it’s useful to have rules of thumb to guide us. In talking to other industry research teams, candidates, and colleagues, one shorthand I keep falling back on is “Floors &amp; Ceilings”.</p>

<p>The basic idea is simply: in planning research, we should set a Floor and Ceiling goal.</p>

<h2 id="floors">Floors</h2>

<p>The floor will often be an internal presentation, documentation, a blog post, or a proof-of-concept tool. It’s the baseline value we get from our work. This ensures that even if we aren’t fully successful with our research, the work isn’t entirely wasted.</p>

<p>This isn’t just a way for leadership to squeeze out value. Setting a floor ensures freedom to experiment and psychological safety for researchers. You can go down a rabbit hole safely, knowing how to de-risk the creative work. Researchers often get trapped in a search for absolute truth, and anything less than success feels like failure. But research is a risky endeavor. The right balance should have you “failing” often. The floor compensates for that.</p>

<p>It sets a foundation that future research can build on. It ensures that “failures” compound.</p>

<h2 id="ceilings">Ceilings</h2>

<p>The ceiling might be a Tier 1 conference talk, a new Product SKU, or protecting X% of the industry. Setting a ceiling is an opportunity for strategic alignment. It ensures moonshots get aligned to company, team, and individual goals.</p>

<p>For the researcher, it empowers and encourages them to dream big and take big swings. Research can have legs, not just get cut off as soon as it hits a value threshold. Without a ceiling, good research gets shipped too early.</p>

<h2 id="together">Together</h2>

<p>Setting the right floor and ceiling sets you up for success. Hitting the floor needs to be achievable with high-confidence. The ceiling should be plausible, but sufficiently audacious.</p>

<p>If a project’s floor is “learn something” and the ceiling is “twitter thread,” that’s more hobby than professional Research. Setting floor <em>and</em> ceiling to “blog post” means you’re probably <a href="https://staffeng.com/guides/work-on-what-matters/">snacking</a> on low-risk, low-reward work.</p>

<p>The floor also formalizes the stages of research. It offers an opportunity to stop-loss a project and recoup salvage value. If we’re able to meet the floor, we should have a good understanding of the viability of reaching the ceiling. It’s a chance for the researcher to advocate for a go/no-go on further investment.</p>

<p><em>Interested in more internals of Industry Research? Check out my coworker Amitai Cohen’s brilliant collection of essays at <a href="https://amitaico.substack.com/">Rhythms of Research</a>.</em></p>]]></content><author><name>ramimac</name></author><category term="security" /><category term="research" /><category term="leadership" /><summary type="html"><![CDATA[Floors set the baseline. Ceilings align the moonshots. A framework for planning successful research.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-02-18-floors-and-ceilings.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-02-18-floors-and-ceilings.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">The Dividends of Cloud Development Environments</title><link href="https://ramimac.me/devboxen" rel="alternate" type="text/html" title="The Dividends of Cloud Development Environments" /><published>2026-02-16T15:00:00+00:00</published><updated>2026-02-16T15:00:00+00:00</updated><id>https://ramimac.me/devboxen</id><content type="html" xml:base="https://ramimac.me/devboxen"><![CDATA[<p><em>The companies winning with AI agents didn’t get lucky. They built the infrastructure years ago.</em></p>

<p>AI Coding Agents are running rampant, and it’s thrilling.</p>

<ul>
  <li>Ramp’s <a href="https://builders.ramp.com/post/why-we-built-our-background-agent">Inspect background agent authored 30% of merged PRs</a>.</li>
  <li>Stripe’s <a href="https://stripe.dev/blog/minions-stripes-one-shot-end-to-end-coding-agents">Minions merge &gt;1000 PRs a week</a>.</li>
  <li>Spotify’s <a href="https://techcrunch.com/2026/02/12/spotify-says-its-best-developers-havent-written-a-line-of-code-since-december-thanks-to-ai/">“best developers” are using “Honk” and “have not written a single line of code since December.”</a></li>
</ul>

<p class="notice--success">Agents have vindicated Cloud Development Environments, and made them essential for embracing the next wave of engineering patterns.</p>

<p>Cloud Development Environments (CDEs) are nothing new.</p>

<ul>
  <li>Stripe’s <a href="https://www.infoq.com/presentations/stripe-dev-env-infrastructure/">public marketing of its Developer Environments [2022]</a> was one of the watershed moments for this pattern.</li>
  <li>Gergely Orosz, of The Pragmatic Engineer, <a href="https://newsletter.pragmaticengineer.com/p/cloud-development-environments">covered Cloud Development Environments in 2023</a>.</li>
  <li>Gartner added Cloud Development Environments to <a href="https://www.gartner.com/en/articles/what-s-new-in-the-2023-gartner-hype-cycle-for-emerging-technologies">their 2023 Hype Cycle</a>.</li>
</ul>

<p>However, they never seemed to break containment. They remained restricted to elite SaaS “startups.” Vendors for CDEs never hit escape velocity.</p>

<p>It’s a shame. CDEs solve essential challenges in scaling development: standardization, ergonomics, speed, and security isolation.</p>

<p>Background agents have changed the calculus. CDEs give you sandboxed execution for untrusted agent code. Reproducible environments mean predictable behavior. Spin-up is trivial, enabling parallelism. Secrets stay centralized, not scattered across developer laptops. The companies that invested in CDEs are seeing them port cleanly <em>and safely</em> over to their army of agents.</p>

<p>If you’re not in the anointed few, you’re trying to tack Agents onto clunky CI/CD and the terrifying security landscape of your developer machines (agents and ~/.aws don’t mix). You won’t see the same pace or the same outcomes.</p>

<p>These agent success stories aren’t lucky. It’s companies earning the dividends of CDE investment. If you’re trying to adopt the latest and greatest in AI Coding patterns, skip the hard lessons. Don’t reinvent the wheel. Start from a CDE.</p>]]></content><author><name>ramimac</name></author><category term="security" /><category term="industry" /><category term="ai" /><summary type="html"><![CDATA[Cloud Development Environments were a nice-to-have. AI agents made them essential, especially for security.]]></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://ramimac.me/preview-images/2026-02-16-devboxen.png" /><media:content medium="image" url="https://ramimac.me/preview-images/2026-02-16-devboxen.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry></feed>