Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects
Cover image for Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Comments
2 min read
Protecting Sensitive Data Using Envelope Encryption
Cover image for Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Why Your Honeypot Catches Humans (Not Bots)

Why Your Honeypot Catches Humans (Not Bots)

2
Comments
3 min read
Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Comments
1 min read
Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks
Cover image for Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Self-Hosting Netbird: A Privacy-First Alternative to Managed Overlay Networks

Comments
5 min read
Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces
Cover image for Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces

Is Your AI Agent a Compliance Risk? How to Find Violations Hidden in Traces

Comments
2 min read
Why Post-Hoc Moderation Fails in Real-Time Systems

Why Post-Hoc Moderation Fails in Real-Time Systems

Comments
4 min read
The New CFO Toolkit: Data, AI, and Cyber Risk in U.S. Corporate Finance

The New CFO Toolkit: Data, AI, and Cyber Risk in U.S. Corporate Finance

Comments
5 min read
I automated data breach response - changing 50 passwords in 30 minutes instead of 8 hours
Cover image for I automated data breach response - changing 50 passwords in 30 minutes instead of 8 hours

I automated data breach response - changing 50 passwords in 30 minutes instead of 8 hours

Comments
3 min read
Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging
Cover image for Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Comments
3 min read
Improved Dependency Submission for GitHub Actions
Cover image for Improved Dependency Submission for GitHub Actions

Improved Dependency Submission for GitHub Actions

Comments
3 min read
How to Improve Checkout Experiences for More Sales

How to Improve Checkout Experiences for More Sales

Comments
3 min read
Decentralized Finance's Biggest Vulnerability: Why Private Key Management Can't Stay Private

Decentralized Finance's Biggest Vulnerability: Why Private Key Management Can't Stay Private

1
Comments 2
4 min read
The $3 Billion Loss Year: End-of-Year Security Report
Cover image for The $3 Billion Loss Year: End-of-Year Security Report

The $3 Billion Loss Year: End-of-Year Security Report

1
Comments
4 min read
Understanding Browser Automation Detection: A Technical Deep Dive for Developers
Cover image for Understanding Browser Automation Detection: A Technical Deep Dive for Developers

Understanding Browser Automation Detection: A Technical Deep Dive for Developers

Comments
7 min read
I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

I Let An AI Pentester: Shannon, On My Vulnerable Go App — Here’s What Happened

Comments
6 min read
How Rate Limiting Saved Me $500 in One Day (Real Story)

How Rate Limiting Saved Me $500 in One Day (Real Story)

Comments
2 min read
NodeJS 101 —  Part 4 🔐 Authorization with JWT

NodeJS 101 —  Part 4 🔐 Authorization with JWT

Comments
4 min read
I’m building a deterministic policy firewall for AI systems — looking for technical feedback

I’m building a deterministic policy firewall for AI systems — looking for technical feedback

Comments
1 min read
PEM vs. PKCS#12 (P12/PFX): Understanding the Difference Between Certificate Formats
Cover image for PEM vs. PKCS#12 (P12/PFX): Understanding the Difference Between Certificate Formats

PEM vs. PKCS#12 (P12/PFX): Understanding the Difference Between Certificate Formats

1
Comments
3 min read
I built a Python tool to hunt down Remote Access Trojans on Windows

I built a Python tool to hunt down Remote Access Trojans on Windows

Comments
1 min read
Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive
Cover image for Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Building Cryptographic Audit Trails for SEC Rule 17a-4: A Technical Deep Dive

Comments
9 min read
Building a Secure CI/CD Pipeline: Or How I Learned to Stop Worrying and Love DevSecOps

Building a Secure CI/CD Pipeline: Or How I Learned to Stop Worrying and Love DevSecOps

Comments
9 min read
Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

Securing IoT: Best Practices for Developers in a Smart-Device World 🔐🌍

6
Comments
4 min read
Is 'Shift Left' Just Another Buzzword? Rethinking Enterprise Security in 2026
Cover image for Is 'Shift Left' Just Another Buzzword? Rethinking Enterprise Security in 2026

Is 'Shift Left' Just Another Buzzword? Rethinking Enterprise Security in 2026

Comments
4 min read
loading...