Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS cloud security: the complete guide for 2026 (IAM, VPC, KMS, GuardDuty)
Cover image for AWS cloud security: the complete guide for 2026 (IAM, VPC, KMS, GuardDuty)

AWS cloud security: the complete guide for 2026 (IAM, VPC, KMS, GuardDuty)

Comments
8 min read
Why I built Akmon, the AI coding agent for regulated engineering

Why I built Akmon, the AI coding agent for regulated engineering

Comments
6 min read
AGEF explained: a portable evidence format for AI agent sessions
Cover image for AGEF explained: a portable evidence format for AI agent sessions

AGEF explained: a portable evidence format for AI agent sessions

Comments
7 min read
How I added cryptographic audit trails to any CrewAI crew in 3 lines
Cover image for How I added cryptographic audit trails to any CrewAI crew in 3 lines

How I added cryptographic audit trails to any CrewAI crew in 3 lines

Comments
3 min read
(The Senses) Image Generation & Media
Cover image for (The Senses) Image Generation & Media

(The Senses) Image Generation & Media

1
Comments
4 min read
Building a Voice-Controlled Local AI Agent with Human-in-the-Loop Execution

Building a Voice-Controlled Local AI Agent with Human-in-the-Loop Execution

Comments
4 min read
7 Mistakes First-Time Server Managers Make (and How Deploynix Prevents Them)
Cover image for 7 Mistakes First-Time Server Managers Make (and How Deploynix Prevents Them)

7 Mistakes First-Time Server Managers Make (and How Deploynix Prevents Them)

Comments
7 min read
Your Pen Test Takes 6 Weeks. Attackers Take 4 Minutes
Cover image for Your Pen Test Takes 6 Weeks. Attackers Take 4 Minutes

Your Pen Test Takes 6 Weeks. Attackers Take 4 Minutes

2
Comments
6 min read
Your WordPress site can be fully compromised in 7 minutes. Here's what the attacker does with each one.
Cover image for Your WordPress site can be fully compromised in 7 minutes. Here's what the attacker does with each one.

Your WordPress site can be fully compromised in 7 minutes. Here's what the attacker does with each one.

Comments
1 min read
Building a PCI-DSS Compliant DevSecOps CI/CD Pipeline for a Fintech Using .NET
Cover image for Building a PCI-DSS Compliant DevSecOps CI/CD Pipeline for a Fintech Using .NET

Building a PCI-DSS Compliant DevSecOps CI/CD Pipeline for a Fintech Using .NET

Comments
8 min read
Warmed Permission Cache: Speed, Security, and the Real Trade-Offs
Cover image for Warmed Permission Cache: Speed, Security, and the Real Trade-Offs

Warmed Permission Cache: Speed, Security, and the Real Trade-Offs

Comments
2 min read
Security Bite: Your Document Processor Is a Prompt Injection Channel — Here's the Fix

Security Bite: Your Document Processor Is a Prompt Injection Channel — Here's the Fix

Comments
2 min read
We open-sourced our AI attack detection engine — 97 MITRE ATLAS rules in a Rust crate
Cover image for We open-sourced our AI attack detection engine — 97 MITRE ATLAS rules in a Rust crate

We open-sourced our AI attack detection engine — 97 MITRE ATLAS rules in a Rust crate

Comments
3 min read
How to Run a CTF That People Actually Learn From (Not Just Compete In)

How to Run a CTF That People Actually Learn From (Not Just Compete In)

Comments
4 min read
We built a firewall for LLM apps

We built a firewall for LLM apps

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.