Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Natural Language Interface for Datadog Log Search

A Natural Language Interface for Datadog Log Search

Comments
4 min read
Building Ghostable & Finding Ideas by Listening Well
Cover image for Building Ghostable & Finding Ideas by Listening Well

Building Ghostable & Finding Ideas by Listening Well

Comments
3 min read
🚀 Modern Security Guide for Java Developers

🚀 Modern Security Guide for Java Developers

Comments
3 min read
Code Smell 315 - Cloudflare Feature Explosion
Cover image for Code Smell 315 - Cloudflare Feature Explosion

Code Smell 315 - Cloudflare Feature Explosion

Comments
13 min read
Bypassing Web Application Firewalls

Bypassing Web Application Firewalls

Comments
5 min read
Day 2 — The Typed Letter
Cover image for Day 2 — The Typed Letter

Day 2 — The Typed Letter

1
Comments
2 min read
WHAT IS A SECRET?

WHAT IS A SECRET?

Comments
6 min read
AI-Powered Bot Detection Trends 2025: The Future of Web Security

AI-Powered Bot Detection Trends 2025: The Future of Web Security

Comments
3 min read
Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security
Cover image for Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security

Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security

Comments
4 min read
JWT Token Validator Challenge
Cover image for JWT Token Validator Challenge

JWT Token Validator Challenge

Comments
8 min read
Understanding SSH: A Beginner's Guide
Cover image for Understanding SSH: A Beginner's Guide

Understanding SSH: A Beginner's Guide

3
Comments
8 min read
How to Protect Model Context Protocol (MCP) Servers with OpenAM and OpenIG

How to Protect Model Context Protocol (MCP) Servers with OpenAM and OpenIG

Comments
9 min read
Linux for Cybersecurity

Linux for Cybersecurity

Comments
1 min read
Rust in the Linux Kernel: A New Dawn for Secure Systems?
Cover image for Rust in the Linux Kernel: A New Dawn for Secure Systems?

Rust in the Linux Kernel: A New Dawn for Secure Systems?

Comments
5 min read
🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide
Cover image for 🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide

🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide

Comments
4 min read
Jailbreaking LLMs: Understanding Prompt Injection Attacks

Jailbreaking LLMs: Understanding Prompt Injection Attacks

Comments
7 min read
Modernizing Legacy Workloads: KubeVirt on AKS with Azure Arc Identity

Modernizing Legacy Workloads: KubeVirt on AKS with Azure Arc Identity

Comments
9 min read
Let's Stop Overprotecting Confidential Information

Let's Stop Overprotecting Confidential Information

Comments
3 min read
IA dans DevSecOps

IA dans DevSecOps

Comments
3 min read
The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security
Cover image for The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

Comments
9 min read
Linux firewall- iptables

Linux firewall- iptables

Comments
2 min read
Why We Don't Use Browser Extensions: The Clickjacking Problem

Why We Don't Use Browser Extensions: The Clickjacking Problem

Comments
5 min read
GreHack 2025

GreHack 2025

Comments
3 min read
AI Agents and context-aware permissions

AI Agents and context-aware permissions

Comments
8 min read
How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

Comments
3 min read
loading...