Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secrets Management in Production

Secrets Management in Production

Comments
6 min read
SAP, Microsoft, Capgemini and Sanctions: What This Deal Really Means for CIOs
Cover image for SAP, Microsoft, Capgemini and Sanctions: What This Deal Really Means for CIOs

SAP, Microsoft, Capgemini and Sanctions: What This Deal Really Means for CIOs

Comments
6 min read
Understanding the AWS Serverless Model: A Practical Guide
Cover image for Understanding the AWS Serverless Model: A Practical Guide

Understanding the AWS Serverless Model: A Practical Guide

Comments
2 min read
Opsfolio - From Interview Task to Production: Building a Security-First DevSecOps Platform

Opsfolio - From Interview Task to Production: Building a Security-First DevSecOps Platform

Comments
5 min read
AWS Compliance with Terraform

AWS Compliance with Terraform

Comments
5 min read
Identity and Access Management for AI Agents

Identity and Access Management for AI Agents

Comments
5 min read
Audio's Invisible Battleground: Decoding Watermark Removal

Audio's Invisible Battleground: Decoding Watermark Removal

Comments
2 min read
A small Script to Detect Sha1-Hulud 2.0 affected Packages in NPM Projects

A small Script to Detect Sha1-Hulud 2.0 affected Packages in NPM Projects

Comments
1 min read
I Scanned 13 Popular MCP Servers. Here's What I Found. 🔐

I Scanned 13 Popular MCP Servers. Here's What I Found. 🔐

Comments
3 min read
WTF OPEN IA?

WTF OPEN IA?

Comments
1 min read
Securing Azure APIM MCP Servers in Production

Securing Azure APIM MCP Servers in Production

Comments
8 min read
Session Service: як правильно будувати сесію у high-load казино

Session Service: як правильно будувати сесію у high-load казино

Comments
6 min read
Ephemeral Vulnerability Scanner: Pure Client-Side JS for Windows/Linux/macOS Vuln Analysis

Ephemeral Vulnerability Scanner: Pure Client-Side JS for Windows/Linux/macOS Vuln Analysis

Comments
1 min read
Stop Storing Plain Text in LocalStorage: End-to-End Encryption - Finally Simple
Cover image for Stop Storing Plain Text in LocalStorage: End-to-End Encryption - Finally Simple

Stop Storing Plain Text in LocalStorage: End-to-End Encryption - Finally Simple

Comments
4 min read
I Built a 'Sudo' Command for AI Agents (and Why You Need It)
Cover image for I Built a 'Sudo' Command for AI Agents (and Why You Need It)

I Built a 'Sudo' Command for AI Agents (and Why You Need It)

Comments
4 min read
The Cryptography That Powers Solana: A Developer's Guide
Cover image for The Cryptography That Powers Solana: A Developer's Guide

The Cryptography That Powers Solana: A Developer's Guide

Comments
3 min read
Launching Pylar -Governed database access layer for AI agents
Cover image for Launching Pylar -Governed database access layer for AI agents

Launching Pylar -Governed database access layer for AI agents

10
Comments
3 min read
Building an Experimental eBPF Firewall in Rust (XDP + Heuristic Risk Scoring)

Building an Experimental eBPF Firewall in Rust (XDP + Heuristic Risk Scoring)

Comments
1 min read
Catch vulnerabilities before they ship: local SonarQube setup (Part 2)
Cover image for Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

1
Comments
8 min read
How I Finally Fixed My .gitignore (and Ended Up Writing an Extension)
Cover image for How I Finally Fixed My .gitignore (and Ended Up Writing an Extension)

How I Finally Fixed My .gitignore (and Ended Up Writing an Extension)

5
Comments 2
1 min read
Stop Using localhost:8080 - Why Your Dev Environment Needs Production-Grade Network Security

Stop Using localhost:8080 - Why Your Dev Environment Needs Production-Grade Network Security

24
Comments
15 min read
Deconstructing a Production-Ready AI Agent: A Beginner's Guide - Part 3

Deconstructing a Production-Ready AI Agent: A Beginner's Guide - Part 3

Comments
5 min read
Building a Password Strength Analyzer with Entropy and Crack Time for Beginners
Cover image for Building a Password Strength Analyzer with Entropy and Crack Time for Beginners

Building a Password Strength Analyzer with Entropy and Crack Time for Beginners

Comments
5 min read
Zurich Insurance Group: Building an Effective Log Management Solution on AWS

Zurich Insurance Group: Building an Effective Log Management Solution on AWS

Comments
6 min read
AWS Policy Deep Dive
Cover image for AWS Policy Deep Dive

AWS Policy Deep Dive

Comments
3 min read
loading...