Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next
Cover image for CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

Comments
2 min read
Data Security & Authorization: The Dual Pillars of a Robust Database System

Data Security & Authorization: The Dual Pillars of a Robust Database System

Comments 1
2 min read
The future of passwords is bright
Cover image for The future of passwords is bright

The future of passwords is bright

7
Comments
1 min read
OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling
Cover image for OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

7
Comments 1
4 min read
Securing APIs Against Unauthorized Access

Securing APIs Against Unauthorized Access

Comments
1 min read
Community Resilience as a Security Capability: Lessons from BSides SF 2025
Cover image for Community Resilience as a Security Capability: Lessons from BSides SF 2025

Community Resilience as a Security Capability: Lessons from BSides SF 2025

Comments
6 min read
The Definitive Auth Guide for Backend Developers
Cover image for The Definitive Auth Guide for Backend Developers

The Definitive Auth Guide for Backend Developers

13
Comments 2
21 min read
Seccomp in Docker: Locking Down System Calls for a Leaner Attack Surface
Cover image for Seccomp in Docker: Locking Down System Calls for a Leaner Attack Surface

Seccomp in Docker: Locking Down System Calls for a Leaner Attack Surface

Comments
3 min read
BitLocker Limbo PSA
Cover image for BitLocker Limbo PSA

BitLocker Limbo PSA

2
Comments
2 min read
Understanding RSA - The Math behind modern encryption
Cover image for Understanding RSA - The Math behind modern encryption

Understanding RSA - The Math behind modern encryption

Comments
3 min read
Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever
Cover image for Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever

Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever

Comments
1 min read
4 OSQuery Commands to run on a Mac

4 OSQuery Commands to run on a Mac

Comments
2 min read
Android Kiosk Mode: The Ultimate Guide to Locking Down Devices
Cover image for Android Kiosk Mode: The Ultimate Guide to Locking Down Devices

Android Kiosk Mode: The Ultimate Guide to Locking Down Devices

5
Comments
6 min read
Establish Transport Rule for External Email Security Awareness
Cover image for Establish Transport Rule for External Email Security Awareness

Establish Transport Rule for External Email Security Awareness

1
Comments
3 min read
Store Encrypted Data in Your Database Using .NET – Secure and Efficient

Store Encrypted Data in Your Database Using .NET – Secure and Efficient

Comments 1
4 min read
Endpoint Security: A Low-Cost Data Diode
Cover image for Endpoint Security: A Low-Cost Data Diode

Endpoint Security: A Low-Cost Data Diode

3
Comments
3 min read
AWS Shared Responsibility Model and Security Principles
Cover image for AWS Shared Responsibility Model and Security Principles

AWS Shared Responsibility Model and Security Principles

Comments
3 min read
The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

Comments
2 min read
Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?
Cover image for Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Comments
10 min read
How Two-Factor Authentication Apps Work Without an Internet Connection
Cover image for How Two-Factor Authentication Apps Work Without an Internet Connection

How Two-Factor Authentication Apps Work Without an Internet Connection

1
Comments
3 min read
Secure Key-Value Store for Raspberry Pi Pico
Cover image for Secure Key-Value Store for Raspberry Pi Pico

Secure Key-Value Store for Raspberry Pi Pico

Comments
4 min read
Responsible AI: The Ethical Framework for Modern Development

Responsible AI: The Ethical Framework for Modern Development

1
Comments
8 min read
Stealthy FortiGate Backdoor: SSL-VPN Symlink Exploit Bypasses Patches

Stealthy FortiGate Backdoor: SSL-VPN Symlink Exploit Bypasses Patches

Comments
4 min read
CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!
Cover image for CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!

CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!

Comments
3 min read
Logs, Metrics, Traces… Leaks? The Case for Auditable Observability
Cover image for Logs, Metrics, Traces… Leaks? The Case for Auditable Observability

Logs, Metrics, Traces… Leaks? The Case for Auditable Observability

3
Comments
4 min read
loading...