Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
[Detection Engineering in My Home Lab] Series 1 ~Building 20+ Sigma Rules for Multi-Source Threat Detection~

[Detection Engineering in My Home Lab] Series 1 ~Building 20+ Sigma Rules for Multi-Source Threat Detection~

1
Comments
4 min read
Figma + ChatGPT = A Smarter Design Workflow 5 Practical Ways to Use Figma Inside ChatGPT

Figma + ChatGPT = A Smarter Design Workflow 5 Practical Ways to Use Figma Inside ChatGPT

5
Comments
4 min read
What Can AI See About You Right Now? I Built a Scanner to Find Out

What Can AI See About You Right Now? I Built a Scanner to Find Out

Comments
3 min read
A Practical Guide to SLS Data Masking: Securing Sensitive Data in LLM Applications

A Practical Guide to SLS Data Masking: Securing Sensitive Data in LLM Applications

Comments
7 min read
I Built a Privacy Vault That Even AI Can't Read

I Built a Privacy Vault That Even AI Can't Read

Comments
4 min read
Adding an outbox, mail, tokens, CSRF, and more

Adding an outbox, mail, tokens, CSRF, and more

Comments
6 min read
Understanding Proxy IP Reputation and Why It Affects Your Success Rate

Understanding Proxy IP Reputation and Why It Affects Your Success Rate

1
Comments
2 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

2
Comments
4 min read
Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Comments
13 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
Safer Pushes, SIEM Webhooks, and Verifiable Releases
Cover image for Safer Pushes, SIEM Webhooks, and Verifiable Releases

Safer Pushes, SIEM Webhooks, and Verifiable Releases

1
Comments
3 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

2
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.