Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Math.random, friend or foe?
Cover image for Math.random, friend or foe?

Math.random, friend or foe?

5
Comments 1
5 min read
I'm a Confident Developer - Who Can't Code
Cover image for I'm a Confident Developer - Who Can't Code

I'm a Confident Developer - Who Can't Code

5
Comments
4 min read
I Fixed AI Coding Assistants with Real-Time npm & CVE Data (DevTrends MCP)

I Fixed AI Coding Assistants with Real-Time npm & CVE Data (DevTrends MCP)

Comments
2 min read
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
Cover image for Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Comments
14 min read
Math.random, friend or foe?
Cover image for Math.random, friend or foe?

Math.random, friend or foe?

Comments
5 min read
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
Cover image for From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

Comments
12 min read
🚨 How I Survived a Token Crash and What I Learned About Protecting My Capital 🚨
Cover image for 🚨 How I Survived a Token Crash and What I Learned About Protecting My Capital 🚨

🚨 How I Survived a Token Crash and What I Learned About Protecting My Capital 🚨

2
Comments
3 min read
Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Comments
9 min read
File Chunking: Why It Matters for Cybersecurity in Modern Applications

File Chunking: Why It Matters for Cybersecurity in Modern Applications

Comments
2 min read
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

2
Comments 1
6 min read
Kubernetes validating admission policy and admission binding
Cover image for Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
FeetFinder & Background Checks: How Deep Do Employment Checks Go?

FeetFinder & Background Checks: How Deep Do Employment Checks Go?

Comments
4 min read
Practical Guide: Detailed Tutorial for Publishing HarmonyOS Apps

Practical Guide: Detailed Tutorial for Publishing HarmonyOS Apps

Comments
5 min read
Building a Production-Ready A2A Protocol Agent: A Technical Journey

Building a Production-Ready A2A Protocol Agent: A Technical Journey

1
Comments
4 min read
😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫
Cover image for 😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

12
Comments 2
3 min read
Building a safer cURL using TOR
Cover image for Building a safer cURL using TOR

Building a safer cURL using TOR

Comments
3 min read
Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It
Cover image for Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Comments
3 min read
BIP-39 and web3 wallet seed phrases: A high-level overview.
Cover image for BIP-39 and web3 wallet seed phrases: A high-level overview.

BIP-39 and web3 wallet seed phrases: A high-level overview.

Comments
3 min read
Complete API Authentication with Laravel 12 Sanctum

Complete API Authentication with Laravel 12 Sanctum

Comments
12 min read
The Silent Threat: Visually Triggered AI Hijacking

The Silent Threat: Visually Triggered AI Hijacking

Comments
2 min read
Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps
Cover image for Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Comments
6 min read
The Dark Side of Automation: When "Auto" Breaks Your Security Model
Cover image for The Dark Side of Automation: When "Auto" Breaks Your Security Model

The Dark Side of Automation: When "Auto" Breaks Your Security Model

Comments
7 min read
📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage
Cover image for 📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

20
Comments 2
5 min read
Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

2
Comments
9 min read
NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

Comments
1 min read
loading...