<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>BoldlyBalance Tech</title>
    <link>https://tech.boldlybalance.life</link>
    <description>AI, Cybersecurity, Cloud, DevOps</description>
    <language>en-us</language>
    <lastBuildDate>Sun, 26 Apr 2026 15:13:16 +0000</lastBuildDate>

    <item>
      <title>Agentic Threat Intelligence: When Both Sides Move at Machine Speed</title>
      <link>https://tech.boldlybalance.life/posts/agentic-threat-intelligence-both-sides-machine-speed.html</link>
      <guid>https://tech.boldlybalance.life/posts/agentic-threat-intelligence-both-sides-machine-speed.html</guid>
      <description>Autonomous SOC agents now rewrite firewall rules and modify IAM policies. Attackers are embedding AI across the kill chain at the same pace. The collision point is here — and governance is not.</description>
      <category>Cybersecurity</category>
      <pubDate>Sat, 26 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>Reverse ML: AI Writes Detection Rules It Never Runs</title>
      <link>https://tech.boldlybalance.life/posts/reverse-ml-ai-writes-detection-rules.html</link>
      <guid>https://tech.boldlybalance.life/posts/reverse-ml-ai-writes-detection-rules.html</guid>
      <description>Amazon RuleForge generates detection rules 336% faster with 67% fewer false positives. Skyhook's Reverse ML uses AI at authoring time, not runtime. The pattern is reshaping detection engineering.</description>
      <category>Cybersecurity</category>
      <pubDate>2026-04-26 00:00:00 GMT</pubDate>
    </item>
<item>
      <title>AI Bug Hunting Delivers: 271 Firefox Flaws and the Open-Source Reckoning</title>
      <link>https://tech.boldlybalance.life/posts/ai-bug-hunting-production-mythos-firefox.html</link>
      <guid>https://tech.boldlybalance.life/posts/ai-bug-hunting-production-mythos-firefox.html</guid>
      <description>Mozilla used Anthropic's Mythos Preview to find and fix 271 security vulnerabilities in Firefox 150 — a 12x improvement over the previous model. Firefox CTO Bobby Holley declared that defenders have rounded the curve. But the production proof raises a harder question: what happens to the open-source projects that cannot afford to put their software through the same bootcamp?</description>
      <category>Cybersecurity</category>
      <pubDate>Mon, 28 Apr 2026 00:00:00 +0000</pubDate>
    </item>

    <item>
      <title>Spec-Driven Development: How AGENTS.md Makes AI Coding Reliable</title>
      <link>https://tech.boldlybalance.life/posts/spec-driven-development-agents-md.html</link>
      <guid>https://tech.boldlybalance.life/posts/spec-driven-development-agents-md.html</guid>
      <description>60,000 repositories now ship AGENTS.md files. Spec-driven development replaces vibe coding with structured context — a six-element framework that reduced AI-generated bugs by 35 to 55 percent at GitHub and achieved a 100 percent pass rate at Vercel. Here is the pattern, the implementation, and the evidence that it works.</description>
      <category>Engineering</category>
      <pubDate>Sun, 27 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>Anthropic Mythos and the Zero-Day Economics Shift</title>
      <link>https://tech.boldlybalance.life/posts/anthropic-mythos-zero-day-economics.html</link>
      <guid>https://tech.boldlybalance.life/posts/anthropic-mythos-zero-day-economics.html</guid>
      <description>Anthropic released Claude Mythos Preview to a gated group of 50 organizations after the model found thousands of zero-day vulnerabilities across every major OS and browser. Within two weeks, unauthorized users gained access, security researchers replicated core findings with public models, and a sandbox escape forced formal verification into the containment stack. Here is the capability breakdown, the three unresolved disputes, and what the new zero-day economics mean for defenders.</description>
      <category>Emerging Tech</category>
      <pubDate>Sat, 26 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>MCP Protocol RCE: The STDIO Command Injection Affecting 150M+ Downloads</title>
      <link>https://tech.boldlybalance.life/posts/mcp-protocol-rce-vulnerability.html</link>
      <guid>https://tech.boldlybalance.life/posts/mcp-protocol-rce-vulnerability.html</guid>
      <description>A single unsanitized function in Anthropic's MCP SDKs — StdioServerParameters — enabled 10 critical CVEs across production platforms, poisoned 9 of 11 registries, and exposed 200,000 instances to remote code execution. Anthropic called it expected behavior. Here is the root cause, the attack patterns, and the guardrails that work.</description>
      <category>Cybersecurity</category>
      <pubDate>Sat, 26 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>AI Agents Open a New Trust Surface</title>
      <link>https://tech.boldlybalance.life/posts/ai-agent-new-trust-surfaces.html</link>
      <guid>https://tech.boldlybalance.life/posts/ai-agent-new-trust-surfaces.html</guid>
      <pubDate>Sat, 26 Apr 2026 00:00:00 +0000</pubDate>
      <description>Four attack families — protocol exploitation, prompt injection, credential leakage, and agent-to-agent trust — have emerged across AI agent deployments in early 2026. Ten MCP CVEs, the Comment and Control cross-vendor prompt attack, the Claude Code source leak, and 88 percent of enterprises reporting agent security incidents map a trust surface that existing zero-trust architectures were not designed to cover.</description>
      <category>Cybersecurity</category>
    </item>
    <item>
      <title>OAuth Supply Chains as the New Lateral Movement</title>
      <link>https://tech.boldlybalance.life/posts/oauth-supply-chain-lateral-movement.html</link>
      <guid>https://tech.boldlybalance.life/posts/oauth-supply-chain-lateral-movement.html</guid>
      <description>The Vercel breach traced through Context AI OAuth tokens exposed a five-stage kill chain that bypasses MFA, survives password rotation, and is replicable across any platform that chains third-party OAuth integrations. Here is the attack pattern and the defensive architecture that stops it.</description>
      <category>Cybersecurity</category>
      <pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>AI Agents Need Cryptographic Identity</title>
      <link>https://tech.boldlybalance.life/posts/ai-agent-cryptographic-identity.html</link>
      <guid>https://tech.boldlybalance.life/posts/ai-agent-cryptographic-identity.html</guid>
      <description>AI agents operate with borrowed human credentials or shared service accounts. Google just shipped cryptographic agent identities in Gemini Enterprise. Here is how the identity gap breaks zero-trust architectures and what the emerging agent IAM pattern looks like.</description>
      <category>Emerging Tech</category>
      <pubDate>Sat, 25 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>Database-per-Tenant Cost Curves Break</title>
      <link>https://tech.boldlybalance.life/posts/database-per-tenant-architecture-cost-curve.html</link>
      <guid>https://tech.boldlybalance.life/posts/database-per-tenant-architecture-cost-curve.html</guid>
      <description>B2B SaaS teams face a clear inflection point around tenant isolation. Here is the decision framework that maps shared databases, schema separation, and dedicated instances to actual team size and revenue.</description>
      <category>SaaS</category>
      <pubDate>Fri, 24 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>Cloud Misconfigurations in AI Workloads: Exposed Vectors</title>
      <link>https://tech.boldlybalance.life/posts/cloud-misconfigurations-ai-workloads.html</link>
      <guid>https://tech.boldlybalance.life/posts/cloud-misconfigurations-ai-workloads.html</guid>
      <description>AI workloads in the cloud misconfigure at twice the rate of traditional applications. S3 buckets, inference endpoints, vector databases, and IAM roles are the leading exposure vectors. Here's the audit pattern that finds them.</description>
      <category>Cloud</category>
      <pubDate>Thu, 23 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>How Technical Debt Taxonomies Help Teams Prioritize Their Work</title>
      <link>https://tech.boldlybalance.life/posts/technical-debt-taxonomy-framework.html</link>
      <guid>https://tech.boldlybalance.life/posts/technical-debt-taxonomy-framework.html</guid>
      <description>Technical, cognitive, and intent debt each require different remediation strategies. Here's a practical framework for classifying and managing all three types.</description>
      <category>DevOps</category>
      <pubDate>Thu, 23 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>AI Agent Orchestration Patterns</title>
      <link>https://tech.boldlybalance.life/posts/ai-agent-orchestration-patterns.html</link>
      <guid>https://tech.boldlybalance.life/posts/ai-agent-orchestration-patterns.html</guid>
      <description>Teams are shifting from monolithic AI chip designs to specialized training and inference architectures. Here's what this pattern reveals about scaling agent workloads and the trade-offs that determine success or failure.</description>
      <category>emerging-tech</category>
      <pubDate>Wed, 22 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>Automated Researchers: When AI Scientists Become Your Coworkers</title>
      <link>https://tech.boldlybalance.life/posts/automated-researchers-ai-coworkers.html</link>
      <guid>https://tech.boldlybalance.life/posts/automated-researchers-ai-coworkers.html</guid>
      <description>Teams building autonomous AI research agents see 68% faster literature review and 42% fewer missed connections. Here's what actually works and when to build versus buy.</description>
      <category>AI</category>
      <pubDate>Wed, 22 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>MCP and A2A Under Linux Foundation Governance</title>
      <link>https://tech.boldlybalance.life/posts/mcp-a2a-aaif-protocol-governance.html</link>
      <guid>https://tech.boldlybalance.life/posts/mcp-a2a-aaif-protocol-governance.html</guid>
      <description>Model Context Protocol and Agent-to-Agent protocol are now under AAIF governance. Here's what the governance structure actually controls and what it means for production deployments.</description>
      <category>AI</category>
      <pubDate>Wed, 22 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>AI Coding Tools and API Key Exposure: The Four Patterns You Cannot See</title>
      <link>https://tech.boldlybalance.life/posts/ai-coding-api-key-exposure.html</link>
      <guid>https://tech.boldlybalance.life/posts/ai-coding-api-key-exposure.html</guid>
      <description>Teams that use AI coding tools see 68% more API key leak incidents than teams that write code manually — four detectable patterns that lead to exposure, and how to close them before attackers find them first.</description>
      <category>Cybersecurity</category>
      <pubDate>Thu, 22 Apr 2026 00:00:00 +0000</pubDate>
    </item>
    <item>
      <title>Multi-Agent Coordination Failures in Production</title>
      <link>https://tech.boldlybalance.life/posts/multi-agent-coordination-failures.html</link>
      <description> Everyone shipped multi-agent systems in 2025. Now the failures are surfacing — context loss between handoffs, conflicting tool calls, runaway loops, and cascading hallucinations. Here's what's breaking and how to fix it.</description>
      <pubDate>Mon, 21 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/multi-agent-coordination-failures.html</guid>
    </item>
    <item>
      <title>AI-Assisted Breaches Are Here: What the Vercel Incident Reveals</title>
      <link>https://tech.boldlybalance.life/posts/ai-assisted-breach-velocity.html</link>
      <description>Vercel's CFO and CEO say attackers moved with 'surprising velocity' and 'in-depth understanding' — hallmarks of AI-assisted intrusions. Here's what the attack pattern actually looks like and how to prepare for it.</description>
      <pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/ai-assisted-breach-velocity.html</guid>
    </item>
    <item>
      <title>Prompt Injection at Scale Explained</title>
      <link>https://tech.boldlybalance.life/posts/prompt-injection-at-scale.html</link>
      <description>Prompt injection used to be a curiosity. MCP toolchains, autonomous agents, and multi-step pipelines have made it an infrastructure-level threat. Here's what the attack surface actually looks like and what defenses work.</description>
      <pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/prompt-injection-at-scale.html</guid>
    </item>
    <item>
      <title>Prompt Injection: The Security Problem Nobody Has Solved</title>
      <link>https://tech.boldlybalance.life/posts/prompt-injection-unsolved-security-problem.html</link>
      <description>Prompt injection attacks don't exploit a bug — they exploit a design property of large language models. That's why every defense so far has been partial, and why securing AI agents is structurally harder than securing traditional software.</description>
      <pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/prompt-injection-unsolved-security-problem.html</guid>
    </item>
    <item>
      <title>Vibe Coding's Technical Debt Trap: What the Velocity Numbers Hide</title>
      <link>https://tech.boldlybalance.life/posts/vibe-coding-technical-debt.html</link>
      <description>AI coding tools claim 50% faster development. The real TCO is 12% higher in year one and 4x maintenance costs by year two. Here's what's actually happening inside vibe-coded codebases.</description>
      <pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/vibe-coding-technical-debt.html</guid>
    </item>
    <item>
      <title>AI Supply Chain Attack Vectors</title>
      <link>https://tech.boldlybalance.life/posts/ai-supply-chain-attacks.html</link>
      <description>Two open-source supply chain attacks in one week — LiteLLM and Axios — compromised 500,000 machines and over 1,000 SaaS environments. Here's what happened and how to close the exposure.</description>
      <pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/ai-supply-chain-attacks.html</guid>
    </item>
    <item>
      <title>How Model Context Protocol Works</title>
      <link>https://tech.boldlybalance.life/posts/how-model-context-protocol-works.html</link>
      <description>A technical guide to Model Context Protocol (MCP) — the open standard that lets AI models connect to external tools, data sources, and services. Covers architecture, the three primitives, transports, and how to evaluate it for your stack.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/how-model-context-protocol-works.html</guid>
    </item>
    <item>
      <title>Intel-Driven Defense: From Threat Intelligence to Detection</title>
      <link>https://tech.boldlybalance.life/posts/intel-driven-defense-workflow.html</link>
      <description>A practical guide to turning threat intelligence into detection rules, response decisions, and measurable security outcomes. Full workflow from collection through feedback.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/intel-driven-defense-workflow.html</guid>
    </item>
    <item>
      <title>How DORA Metrics Work—and What They Measure</title>
      <link>https://tech.boldlybalance.life/posts/how-dora-metrics-work.html</link>
      <description>A practical guide to the four DORA metrics — deployment frequency, lead time for changes, change failure rate, and MTTR — what each measures, how to collect the data, and how to use them without gaming the numbers.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/how-dora-metrics-work.html</guid>
    </item>
    <item>
      <title>How a Data Lakehouse Works—And When to Use It</title>
      <link>https://tech.boldlybalance.life/posts/how-a-data-lakehouse-actually-works.html</link>
      <description>A clear technical guide to data lakehouse architecture — object storage, table formats like Apache Iceberg and Delta Lake, query engines, and how to decide when a lakehouse fits your needs.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/how-a-data-lakehouse-actually-works.html</guid>
    </item>
    <item>
      <title>How to Secure AI Agents in Production: A Practical Framework</title>
      <link>https://tech.boldlybalance.life/posts/securing-ai-agents-in-production.html</link>
      <description>A practical security framework for AI agents in production — covering prompt injection, credential exposure, access controls, and monitoring with concrete steps for each.</description>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/securing-ai-agents-in-production.html</guid>
    </item>
    <item>
      <title>A Practical Guide to Shadow AI Risk in the Enterprise</title>
      <link>https://tech.boldlybalance.life/posts/shadow-ai-enterprise-risk-guide.html</link>
      <description>Learn how to detect, assess, and govern shadow AI in your enterprise — the unsanctioned tools employees are already using with your company data.</description>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/shadow-ai-enterprise-risk-guide.html</guid>
    </item>
    <item>
      <title>AI Agent Governance: The Real Limits</title>
      <link>https://tech.boldlybalance.life/posts/ai-agent-governance-boundaries.html</link>
      <description>Teams with agent delegation policies see 64% fewer unplanned escalations. Here's the four boundaries that keep agents useful without becoming unpredictable.</description>
      <pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/ai-agent-governance-boundaries.html</guid>
    </item>
    <item>
      <title>Agent State Management: When Persistence Wins</title>
      <link>https://tech.boldlybalance.life/posts/agent-state-management-persistence.html</link>
      <description>Stateless agents scale. Persistent agents learn. The tradeoffs decide which architecture you need — and when to switch between them.</description>
      <pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/agent-state-management-persistence.html</guid>
    </item>
    <item>
      <title>API Gateway Costs: The Hidden Economics of Rate Limits</title>
      <link>https://tech.boldlybalance.life/posts/api-gateway-costs-economics.html</link>
      <description>Rate limits protect backend services. Connection pooling reduces overhead. The unseen costs add up — and the architecture choices determine whether they help or hurt.</description>
      <pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/api-gateway-costs-economics.html</guid>
    </item>
    <item>
      <title>Observability Debt: Logging Gaps</title>
      <link>https://tech.boldlybalance.life/posts/observability-debt-logging-gaps.html</link>
      <description>Teams with 5+ observation gaps see 3.2x more mean-time-to-identify. Here's how to identify high-value signals and remove noise without slowing down development.</description>
      <pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/observability-debt-logging-gaps.html</guid>
    </item>
    <item>
      <title>Orchestrating Agents Without Chaos</title>
      <link>https://tech.boldlybalance.life/posts/orchestrating-agents-without-chaos.html</link>
      <description>Teams using orchestrated agents ship features 40% faster. The pattern isn't more agents—it's how you connect them. Four reliable orchestration modes that scale with team size and保持 context.</description>
      <pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/orchestrating-agents-without-chaos.html</guid>
    </item>
    <item>
      <title>Agent-Based Security Automation Fails at 78% of Teams—Here's Why</title>
      <link>https://tech.boldlybalance.life/posts/agent-security-automation-fails-at-78-percent.html</link>
      <description>Autonomous security agents sound cool but 78% of teams abandon them within 6 months because they can't handle context gaps. Real security needs humans-in-the-loop, not autonomous systems guessing.</description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/agent-security-automation-fails-at-78-percent.html</guid>
    </item>
    <item>
      <title>AI-Powered Security Operations</title>
      <link>https://tech.boldlybalance.life/posts/ai-powered-soc-security-orchestration.html</link>
      <description>SOCs using AI to fight AI: How orchestration reduced false positives by 73% and cut analyst burnout in half.</description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/ai-powered-soc-security-orchestration.html</guid>
    </item>
    <item>
      <title>Incident Response and On-Call Fatigue</title>
      <link>https://tech.boldlybalance.life/posts/incident-response-on-call-fatigue-threshold.html</link>
      <description>Data shows alert volume becomes harmful at 500-700 RPS for SOC teams. What IBM X-Force and SANS say about detection quality vs. false positive rates and MTTR regression.</description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/incident-response-on-call-fatigue-threshold.html</guid>
    </item>
    <item>
      <title>LLMs in SOCs: False Confidence, Not Better Detection</title>
      <link>https://tech.boldlybalance.life/posts/llms-in-socs-generate-more-false-confidence.html</link>
      <description>Chat-based alert triage looks promising but actually increases noise by 3.2x. The ‘smart’ triage layer creates synthetic detection opportunities instead of reducing them.</description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/llms-in-socs-generate-more-false-confidence.html</guid>
    </item>
    <item>
      <title>A Four-Hour SOC Triage Audit: How to Measure What Actually Matters</title>
      <link>https://tech.boldlybalance.life/posts/soc-triage-audit.html</link>
      <description>Stop guessing where triage time is lost. Run a four-hour diagnostic that reveals the exact phase leaking your alert response time.</description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/soc-triage-audit.html</guid>
    </item>
    <item>
      <title>Zero Trust Overhead: When Security Layering Slows Innovation</title>
      <link>https://tech.boldlybalance.life/posts/zero-trust-overhead-when-security-layering-slow-innovation.html</link>
      <description>Zero trust implementation adds 23% overhead to deployment cycles. Teams that adopted a 'trust but verify' approach (partial zero trust) shipped faster AND had fewer incidents.</description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/zero-trust-overhead-when-security-layering-slow-innovation.html</guid>
    </item>
    <item>
      <title>Credential Leakage in AI Chat Sessions</title>
      <link>https://tech.boldlybalance.life/posts/ai-chat-credential-leakage.html</link>
      <description>Redacted vs. actual keys, context window persistence, and chat client security boundaries</description>
      <pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/ai-chat-credential-leakage.html</guid>
    </item>
    <item>
      <title>Cloud Security Checklist: The 5 Things 80% of Teams Get Wrong</title>
      <link>https://tech.boldlybalance.life/posts/cloud-security-checklist.html</link>
      <description>IAM roles vs. policies, KMS key rotation, S3 bucket public access, logging defaults, and network isolation — the five controls that prevent 95% of breaches.</description>
      <pubDate>Wed, 15 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/cloud-security-checklist.html</guid>
    </item>
    <item>
      <title>Agent Memory vs. Chat History: What Persistence Actually Means</title>
      <link>https://tech.boldlybalance.life/posts/agent-memory-vs-chat-history.html</link>
      <description>Most agents confuse chat history with actual persistence. Here's the technical distinction — and when each is appropriate.</description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/agent-memory-vs-chat-history.html</guid>
    </item>
    <item>
      <title>Cybersecurity Scans Slow You Down—Until You Hit 12 Failures</title>
      <link>https://tech.boldlybalance.life/posts/cybersecurity-scans-slow-you-down-until-you-hit-12-failures.html</link>
      <description>Build times balloon after adding too many scanners. The threshold isn't scanners—it's failure count. 12 critical issues is where overhead pays off.</description>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://tech.boldlybalance.life/posts/cybersecurity-scans-slow-you-down-until-you-hit-12-failures.html</guid>
    </item>
  </channel>
</rss>
