HMMNM
Initializing
Skip to content
Hmmnm
  • Home
  • Blog
  • Security

      Latest in Security

    • Read more about the article Red Teaming LLM Applications: A Practical Playbook (2026)

      Red Teaming LLM Applications: A Practical Playbook (2026)

      April 6, 2026
    • Read more about the article Post-Quantum Cryptography for Cyber Professionals

      Post-Quantum Cryptography for Cyber Professionals

      April 1, 2026
    • Read more about the article Crypto Agility After PQC: How to Avoid the Next Migration Failure

      Crypto Agility After PQC: How to Avoid the Next Migration Failure

      March 28, 2026
    • Read more about the article AI Supply Chain Attacks: When Your AI Model Becomes the Backdoor

      AI Supply Chain Attacks: When Your AI Model Becomes the Backdoor

      March 23, 2026
  • Travel

      Latest in Travel

    • Read more about the article Rishikesh: The Yoga Capital of the World

      Rishikesh: The Yoga Capital of the World

      May 28, 2023
    • Read more about the article Cherrapunji: Uncover India Pristine Paradise

      Cherrapunji: Uncover India Pristine Paradise

      October 2, 2022
    • Read more about the article Kartarpur Sahib: The End to a 72-Year Wait — Complete Travel Guide

      Kartarpur Sahib: The End to a 72-Year Wait — Complete Travel Guide

      January 15, 2020
  • Food

      Latest in Food

    • Read more about the article The Ultimate Guide to Chole: Regional Variations

      The Ultimate Guide to Chole: Regional Variations

      March 15, 2025
  • Experience

      Latest in Experience

    • Read more about the article AI and Mental Health: Technology Meets Human Healing

      AI and Mental Health: Technology Meets Human Healing

      April 1, 2026
    • Read more about the article Kashmir: The Mirage of Peace and Prosperity Part 2

      Kashmir: The Mirage of Peace and Prosperity Part 2

      July 20, 2019
    • Read more about the article Kashmir: The Mirage of Peace and Prosperity Part 1

      Kashmir: The Mirage of Peace and Prosperity Part 1

      July 20, 2019
    • Read more about the article The Lifesaving Act of Blood Donation: Benefits, Risks & Evidence

      The Lifesaving Act of Blood Donation: Benefits, Risks & Evidence

      January 15, 2019
  • About
  • Contact
  • Toggle website search
Menu Close
  • Home
  • Blog
  • Security
  • Travel
  • Food
  • Experience
  • About
  • Contact
  • Toggle website search

Model Context Protocol

  1. Home>
  2. Blog>
  3. Model Context Protocol
Read more about the article WHAT is MCP (Model Context Protocol)
WHAT is MCP (Model Context Protocol)

WHAT is MCP (Model Context Protocol)

  • Post author:Prabhu Kalyan Samal
  • Post published:March 22, 2026
  • Post category:Technology

Model Context Protocol (MCP) is an open standard enabling AI assistants to communicate with external tools and data sources seamlessly. Learn how MCP works, its architecture, and why it matters.

Continue ReadingWHAT is MCP (Model Context Protocol)
Read more about the article Securing Multi-Agent Systems: A2A, MCP, Memory, and Cross-Agent Trust Boundaries

Securing Multi-Agent Systems: A2A, MCP, Memory, and Cross-Agent Trust Boundaries

  • Post author:
  • Post published:January 18, 2026
  • Post category:Security

Explore multi-agent AI security: A2A protocol hardening, MCP boundary enforcement, cross-agent memory isolation, and trust boundary design patterns.

Continue ReadingSecuring Multi-Agent Systems: A2A, MCP, Memory, and Cross-Agent Trust Boundaries
Read more about the article MCP Security and Pentesting: Threats & Hardening
MCP Security and Pentesting: Threats & Hardening

MCP Security and Pentesting: Threats & Hardening

  • Post author:Prabhu Kalyan Samal
  • Post published:January 8, 2026
  • Post category:Security

A comprehensive security assessment of the Model Context Protocol covering threat modeling, attack surface analysis, pentest methodologies, prompt injection test cases, and hardening strategies for MCP servers and clients.

Continue ReadingMCP Security and Pentesting: Threats & Hardening

Categories

  • Experience (4)
  • Food (1)
  • Security (30)
  • Technology (4)
  • Travel (3)

Recent Posts

  • Red Teaming LLM Applications: A Practical Playbook (2026)
  • TurboQuant Explained: Google AI Memory Breakthrough
  • AI and Mental Health: Technology Meets Human Healing
  • Post-Quantum Cryptography for Cyber Professionals
  • Zero Trust Architecture for AI Systems: Implementation Guide
  • Crypto Agility After PQC: How to Avoid the Next Migration Failure
  • AI Supply Chain Attacks: When Your AI Model Becomes the Backdoor
  • WHAT is MCP (Model Context Protocol)
  • Supply Chain Security: Risks in Dependencies, Builds & Secrets
  • Prompt Injection in 2026: Real Attacks & Defense Strategies
  • SSH to VPS Security Pentesting: Scenarios, Tools & Hardening
  • Identity Security: Modern Attacks on Users, Sessions & Trust
  • AI Model Extraction and Distillation Attacks: How Your Model Gets Stolen
  • OWASP Top 10 for Agentic Applications 2026: Complete Security Guide
  • API Security: Authorization Flaws Behind Modern Breaches

Archives

  • April 2026 (4)
  • March 2026 (12)
  • February 2026 (8)
  • January 2026 (5)
  • December 2025 (1)
  • November 2025 (1)
  • October 2025 (1)
  • August 2025 (1)
  • March 2025 (1)
  • January 2025 (1)
  • June 2023 (1)
  • May 2023 (1)
  • October 2022 (1)
  • January 2020 (1)
  • July 2019 (2)
  • January 2019 (1)

Newsletter

Get all latest content delivered to your email a few times a month. Updates and news about all categories will send to you.
Email is required Email is not valid
This field is required
Thanks for your subscription.
Failed to subscribe, please contact admin.
Hmmnm

Our Other Sites

  • Hmmnm.in
  • Odia.hmmnm.in

Quick Links

  • About Me
  • Contact
  • Blog
  • Privacy Policy
  • Disclaimer

Contact Info

  • 📧 contact@hmmnm.com
  • 🌐 hmmnm.com
𝕏⌨in✉
© 2026 @Hmmnm
  • Home
  • Blog
  • Security
  • Travel
  • Food
  • Experience
  • About
  • Contact