Aakash RahsiFeb 151 min readRAG Becomes a Trust Boundary | Engineering Verifiable Copilot Behavior in Microsoft 365
Aakash RahsiFeb 141 min readThe Tenant That Explains Itself | Engineering a Self-Auditing Microsoft 365 Trust Boundary
Aakash RahsiFeb 131 min readThe Post-Patch Era | How AI, Identity, and Telemetry Redefine the CVE Model