Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story
Cover image for Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Why Can We Use "Shorter" Keys?: Key Length vs Security Bits, the Real Story

Comments
11 min read
I Ran Snyk's Free MCP Scanner on 10 Servers. Here's What It Missed.

I Ran Snyk's Free MCP Scanner on 10 Servers. Here's What It Missed.

Comments
4 min read
The Rise of Trust Engineering
Cover image for The Rise of Trust Engineering

The Rise of Trust Engineering

1
Comments
5 min read
Vetran: Trust Infrastructure for AI Agents
Cover image for Vetran: Trust Infrastructure for AI Agents

Vetran: Trust Infrastructure for AI Agents

Comments
2 min read
Amazon Bedrock Guardrails: Architecting Safe, Governed Generative AI by Design
Cover image for Amazon Bedrock Guardrails: Architecting Safe, Governed Generative AI by Design

Amazon Bedrock Guardrails: Architecting Safe, Governed Generative AI by Design

Comments
9 min read
I Found 11 Security Gaps in My Own Bedrock Agent — Here's How I Fixed Them

I Found 11 Security Gaps in My Own Bedrock Agent — Here's How I Fixed Them

1
Comments 1
17 min read
Contribute to open source projects without leaving a trace: a new way to collaborate on GitHub
Cover image for Contribute to open source projects without leaving a trace: a new way to collaborate on GitHub

Contribute to open source projects without leaving a trace: a new way to collaborate on GitHub

1
Comments
3 min read
AI Agents Are Getting Credit Cards. The Fraud Stack Is Missing.

AI Agents Are Getting Credit Cards. The Fraud Stack Is Missing.

Comments
2 min read
How I built cryptographic audit trails for AI agents (and why it matters)
Cover image for How I built cryptographic audit trails for AI agents (and why it matters)

How I built cryptographic audit trails for AI agents (and why it matters)

2
Comments 1
2 min read
I Built a Security Scanner in C That Grades Any Website A-F — Here's How
Cover image for I Built a Security Scanner in C That Grades Any Website A-F — Here's How

I Built a Security Scanner in C That Grades Any Website A-F — Here's How

Comments
4 min read
Subdomain takeovers are still embarrassingly common...
Cover image for Subdomain takeovers are still embarrassingly common...

Subdomain takeovers are still embarrassingly common...

1
Comments
2 min read
Introducing the ABOM: Why Your CI/CD Pipelines Need a Bill of Materials
Cover image for Introducing the ABOM: Why Your CI/CD Pipelines Need a Bill of Materials

Introducing the ABOM: Why Your CI/CD Pipelines Need a Bill of Materials

Comments
4 min read
The LiteLLM Supply Chain Attack Broke Trust in Python-Based AI Infrastructure

The LiteLLM Supply Chain Attack Broke Trust in Python-Based AI Infrastructure

6
Comments
7 min read
Why Your WordPress Security Plugin is Killing Your TTFB (And What to Use Instead)
Cover image for Why Your WordPress Security Plugin is Killing Your TTFB (And What to Use Instead)

Why Your WordPress Security Plugin is Killing Your TTFB (And What to Use Instead)

1
Comments
2 min read
Introducing AIO Sandbox, All-in-One Sandbox Environment for AI Agents

Introducing AIO Sandbox, All-in-One Sandbox Environment for AI Agents

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.