<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Manish Pandey · Writing</title><description>Cybersecurity architect and researcher. 13+ years across application, infrastructure, cloud, and AI security. Writing, research, and lab notes from Bengaluru.</description><link>https://manishpandey.co.in/</link><language>en-us</language><copyright>© 2026 Manish Pandey</copyright><atom:link href="https://manishpandey.co.in/rss.xml" rel="self" type="application/rss+xml"/><lastBuildDate>Thu, 21 May 2026 11:15:34 GMT</lastBuildDate><item><title>Why STRIDE Breaks When You Threat Model AI Agents (And What to Do Instead)</title><link>https://manishpandey.co.in/why-stride-breaks-when-you-threat-model-ai-agents-and-what-to-do-instead/</link><guid isPermaLink="true">https://manishpandey.co.in/why-stride-breaks-when-you-threat-model-ai-agents-and-what-to-do-instead/</guid><description>STRIDE was built for deterministic systems. Agentic AI breaks its core assumptions. Here is a five-zone method that actually finds EchoLeak-class attacks.</description><pubDate>Tue, 24 Mar 2026 00:00:00 GMT</pubDate><category>ai-security</category><category>threat-modeling</category><category>llm</category><category>agentic-ai</category><author>hello@manishpandey.co.in</author></item><item><title>Red Teaming Generative AI: Language as the New Exploit Vector</title><link>https://manishpandey.co.in/red-teaming-generative-ai-why-language-is-the-new-exploit-vector/</link><guid isPermaLink="true">https://manishpandey.co.in/red-teaming-generative-ai-why-language-is-the-new-exploit-vector/</guid><description>Prompts are payloads. Why classical red-teaming misses LLM-native attacks, and how to design adversarial tests that surface jailbreaks, tool misuse, and goal hijack.</description><pubDate>Fri, 13 Feb 2026 00:00:00 GMT</pubDate><category>ai-security</category><category>red-teaming</category><category>llm</category><author>hello@manishpandey.co.in</author></item><item><title>How to Fortify IoT Devices Against Hidden Cyber Threats</title><link>https://manishpandey.co.in/how-to-fortify-iot-devices-against-hidden-cyber-threats/</link><guid isPermaLink="true">https://manishpandey.co.in/how-to-fortify-iot-devices-against-hidden-cyber-threats/</guid><description>IoT devices fail open by default. A pragmatic checklist for hardening firmware, networks, and lifecycle management against the threats most teams overlook.</description><pubDate>Sat, 11 Oct 2025 00:00:00 GMT</pubDate><category>iot</category><category>infrastructure-security</category><author>hello@manishpandey.co.in</author></item><item><title>Build Ironclad ML Security Fast: MAESTRO Framework Explained</title><link>https://manishpandey.co.in/build-ironclad-ml-security-fast-maestro-framework-explained/</link><guid isPermaLink="true">https://manishpandey.co.in/build-ironclad-ml-security-fast-maestro-framework-explained/</guid><description>CSA&apos;s MAESTRO framework, explained for practitioners. Layer-by-layer attack surface, control mapping, and how to apply it to your ML pipeline this week.</description><pubDate>Thu, 02 Oct 2025 00:00:00 GMT</pubDate><category>ml-security</category><category>ai-security</category><category>frameworks</category><author>hello@manishpandey.co.in</author></item><item><title>Win the AI Security Battle: Essential Moves for Leaders</title><link>https://manishpandey.co.in/win-the-ai-security-battle-essential-moves-for-leaders/</link><guid isPermaLink="true">https://manishpandey.co.in/win-the-ai-security-battle-essential-moves-for-leaders/</guid><description>Five concrete moves security leaders should make this quarter to keep up with AI adoption, without slowing the teams shipping it.</description><pubDate>Thu, 02 Oct 2025 00:00:00 GMT</pubDate><category>ai-security</category><category>leadership</category><category>strategy</category><author>hello@manishpandey.co.in</author></item><item><title>Elevate Cyber Defense: Start Threat Modeling Now</title><link>https://manishpandey.co.in/elevate-cyber-defense-start-threat-modeling-now/</link><guid isPermaLink="true">https://manishpandey.co.in/elevate-cyber-defense-start-threat-modeling-now/</guid><description>Why threat modeling is the highest-leverage activity in a security program, and how to start without buying tooling or hiring consultants.</description><pubDate>Thu, 15 Aug 2024 00:00:00 GMT</pubDate><category>threat-modeling</category><author>hello@manishpandey.co.in</author></item><item><title>Transform Your Security Strategy with Leading Threat Modeling Tools</title><link>https://manishpandey.co.in/transform-your-security-strategy-with-leading-threat-modeling-tools/</link><guid isPermaLink="true">https://manishpandey.co.in/transform-your-security-strategy-with-leading-threat-modeling-tools/</guid><description>A practitioner&apos;s comparison of OWASP Threat Dragon, IriusRisk, Microsoft Threat Modeling Tool, and others, with concrete picks by team size and maturity.</description><pubDate>Sun, 02 Jun 2024 00:00:00 GMT</pubDate><category>threat-modeling</category><category>tooling</category><author>hello@manishpandey.co.in</author></item><item><title>Cyber Resilience: How to Implement Cutting-Edge Threat Modeling Techniques</title><link>https://manishpandey.co.in/cyber-resilience-how-to-implement-cutting-edge-threat-modeling-techniques/</link><guid isPermaLink="true">https://manishpandey.co.in/cyber-resilience-how-to-implement-cutting-edge-threat-modeling-techniques/</guid><description>Beyond STRIDE: attack trees, PASTA, kill chains, and how to combine them into a methodology your engineers will actually use.</description><pubDate>Sat, 01 Jun 2024 00:00:00 GMT</pubDate><category>threat-modeling</category><category>resilience</category><author>hello@manishpandey.co.in</author></item><item><title>Advance Your Security: PenTesting&apos;s Critical Edge in ISO 27001</title><link>https://manishpandey.co.in/advance-your-security-pentestings-critical-edge-in-iso-27001/</link><guid isPermaLink="true">https://manishpandey.co.in/advance-your-security-pentestings-critical-edge-in-iso-27001/</guid><description>Where pentesting fits inside an ISO 27001 program, what auditors look for, and how to scope tests so they produce defensible evidence, not just findings.</description><pubDate>Sat, 17 Feb 2024 00:00:00 GMT</pubDate><category>compliance</category><category>pentesting</category><category>iso-27001</category><author>hello@manishpandey.co.in</author></item><item><title>Empower Your Security: Essential Insights into Threat Modeling</title><link>https://manishpandey.co.in/empower-your-security-essential-insights-into-threat-modeling/</link><guid isPermaLink="true">https://manishpandey.co.in/empower-your-security-essential-insights-into-threat-modeling/</guid><description>A foundational guide to threat modeling: what it is, when to do it, who should be in the room, and the seven questions every model must answer.</description><pubDate>Mon, 01 Jan 2024 00:00:00 GMT</pubDate><category>threat-modeling</category><category>fundamentals</category><author>hello@manishpandey.co.in</author></item></channel></rss>