Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Built a File Encryption App in Rust. Here’s What I Learned About Trust.

I Built a File Encryption App in Rust. Here’s What I Learned About Trust.

Comments
3 min read
GPT-5.4-Cyber and Mythos Are Here. Who Governs the Defenders' AI Agents?

GPT-5.4-Cyber and Mythos Are Here. Who Governs the Defenders' AI Agents?

Comments
5 min read
We Scanned 200 SMB Domains. Here's What We Found.

We Scanned 200 SMB Domains. Here's What We Found.

Comments
5 min read
Proving What Your AI Agent Did: Introducing Traceseal
Cover image for Proving What Your AI Agent Did: Introducing Traceseal

Proving What Your AI Agent Did: Introducing Traceseal

Comments
2 min read
Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform
Cover image for Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform

Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform

Comments
3 min read
Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring

Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring

Comments
6 min read
Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Comments
8 min read
Running AI agents in healthcare without sending PHI to OpenAI or Anthropic
Cover image for Running AI agents in healthcare without sending PHI to OpenAI or Anthropic

Running AI agents in healthcare without sending PHI to OpenAI or Anthropic

5
Comments 5
6 min read
I scanned the top 20 npm packages. Everyone passed CVE checks, but here's what the static analysis found

I scanned the top 20 npm packages. Everyone passed CVE checks, but here's what the static analysis found

1
Comments
3 min read
Vibe Coding Security: What Happens When Developers Trust AI Too Much

Vibe Coding Security: What Happens When Developers Trust AI Too Much

Comments
10 min read
When Third Party Support Becomes Your Weakest Point: April 2026 Security Breach
Cover image for When Third Party Support Becomes Your Weakest Point: April 2026 Security Breach

When Third Party Support Becomes Your Weakest Point: April 2026 Security Breach

Comments
3 min read
5 Smart Contract Vulnerabilities That AI Catches Better Than Static Analyzers
Cover image for 5 Smart Contract Vulnerabilities That AI Catches Better Than Static Analyzers

5 Smart Contract Vulnerabilities That AI Catches Better Than Static Analyzers

Comments
3 min read
Why Polaris Never Touches Your Cloud Credentials: Storage Config Internals

Why Polaris Never Touches Your Cloud Credentials: Storage Config Internals

Comments
8 min read
AI applications need more than logs: they need tighter control boundaries

AI applications need more than logs: they need tighter control boundaries

1
Comments 1
1 min read
Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)
Cover image for Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)

Your First BIN Lookup Integration in Python (With Real Fraud Use Cases)

1
Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.