Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🛠️ Devs, check this out: automatic frontend hosting + proxying inside TEEs
Cover image for 🛠️ Devs, check this out: automatic frontend hosting + proxying inside TEEs

🛠️ Devs, check this out: automatic frontend hosting + proxying inside TEEs

2
Comments 2
1 min read
How to Implement Content Security Policy in Nuxt
Cover image for How to Implement Content Security Policy in Nuxt

How to Implement Content Security Policy in Nuxt

3
Comments
3 min read
AI Camouflage: Clothing That Breaks the Algorithm

AI Camouflage: Clothing That Breaks the Algorithm

Comments
2 min read
How Serverless Shrinks PCI Scope

How Serverless Shrinks PCI Scope

1
Comments
4 min read
New winaudit crate designed for Windows Security Assessment | Audit.

New winaudit crate designed for Windows Security Assessment | Audit.

Comments
1 min read
How I Reverse-Engineered Perplexity’s Referral Signup
Cover image for How I Reverse-Engineered Perplexity’s Referral Signup

How I Reverse-Engineered Perplexity’s Referral Signup

Comments
6 min read
So What Is an API Gateway Anyway? You Encounter Them All The Time and Never Even Know...

So What Is an API Gateway Anyway? You Encounter Them All The Time and Never Even Know...

3
Comments
2 min read
ICYMI - pre:Invent announcements 2025
Cover image for ICYMI - pre:Invent announcements 2025

ICYMI - pre:Invent announcements 2025

Comments
10 min read
Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Comments
1 min read
Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

1
Comments
2 min read
Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds
Cover image for Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Comments
1 min read
Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

1
Comments
2 min read
A importância de gerenciar corretamente variáveis de ambiente (.env)

A importância de gerenciar corretamente variáveis de ambiente (.env)

Comments
3 min read
Key Lessons From the Bitcoin Whitepaper

Key Lessons From the Bitcoin Whitepaper

Comments
3 min read
Why the Directory Is the Core of IAM: The Digital Heartbeat of Every Organization

Why the Directory Is the Core of IAM: The Digital Heartbeat of Every Organization

Comments
3 min read
Designing RBAC for AI agents

Designing RBAC for AI agents

Comments
13 min read
The LLM Shield: How to Build Production-Grade NSFW Guardrails for AI Agents

The LLM Shield: How to Build Production-Grade NSFW Guardrails for AI Agents

1
Comments
4 min read
🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

Comments
3 min read
Spring Security Flow

Spring Security Flow

Comments
1 min read
Serverless Student Management System (AWS)
Cover image for Serverless Student Management System (AWS)

Serverless Student Management System (AWS)

1
Comments
2 min read
OSI Layer 4 Security Vulnerabilities & Resolutions
Cover image for OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
AI coding agents can run rm -rf / on your machine. Here's how to stop them

AI coding agents can run rm -rf / on your machine. Here's how to stop them

Comments
2 min read
A Guide to Production-Ready Security, Logging and Architecture in the express app

A Guide to Production-Ready Security, Logging and Architecture in the express app

Comments
4 min read
Human vs. Machine Cognition: Brains, Minds, and Meaning
Cover image for Human vs. Machine Cognition: Brains, Minds, and Meaning

Human vs. Machine Cognition: Brains, Minds, and Meaning

Comments
3 min read
The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)
Cover image for The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

Comments
8 min read
loading...