Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Erase & Protect: Face Anonymization Without the AI Training Hassle by Arvind Sundararajan

Erase & Protect: Face Anonymization Without the AI Training Hassle by Arvind Sundararajan

1
Comments
2 min read
Verifiable Compute for On-Chain Trading Feels Like an Underrated Breakthrough
Cover image for Verifiable Compute for On-Chain Trading Feels Like an Underrated Breakthrough

Verifiable Compute for On-Chain Trading Feels Like an Underrated Breakthrough

2
Comments 2
2 min read
Swapping Authentication Strategies Without Touching UI: A Frontend Architecture Demo
Cover image for Swapping Authentication Strategies Without Touching UI: A Frontend Architecture Demo

Swapping Authentication Strategies Without Touching UI: A Frontend Architecture Demo

Comments
2 min read
Stop Overpaying for AWS WAF! (5 Cost Optimization Tips)

Stop Overpaying for AWS WAF! (5 Cost Optimization Tips)

Comments
2 min read
Secure Agent Database Access: Architecture Patterns That Actually Work
Cover image for Secure Agent Database Access: Architecture Patterns That Actually Work

Secure Agent Database Access: Architecture Patterns That Actually Work

Comments
15 min read
How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws
Cover image for How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

Comments
14 min read
Securing Serverless APIs with Amazon Cognito and API Gateway JWT Authorizers
Cover image for Securing Serverless APIs with Amazon Cognito and API Gateway JWT Authorizers

Securing Serverless APIs with Amazon Cognito and API Gateway JWT Authorizers

Comments
5 min read
🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

Comments
1 min read
How to Generate Secure JWT Secrets: A Complete Guide for Developers

How to Generate Secure JWT Secrets: A Complete Guide for Developers

1
Comments
4 min read
How to integrate Brakeman Security Scanner with GitHub Code Scanning

How to integrate Brakeman Security Scanner with GitHub Code Scanning

2
Comments
5 min read
How 129KB of Whitespace (and a Recursive Loop) Broke the Web
Cover image for How 129KB of Whitespace (and a Recursive Loop) Broke the Web

How 129KB of Whitespace (and a Recursive Loop) Broke the Web

1
Comments
5 min read
❄️A Five-Minute UI Feature That Became an XSS Time Bomb
Cover image for ❄️A Five-Minute UI Feature That Became an XSS Time Bomb

❄️A Five-Minute UI Feature That Became an XSS Time Bomb

59
Comments 20
4 min read
I don't trust password managers. So I built one.
Cover image for I don't trust password managers. So I built one.

I don't trust password managers. So I built one.

2
Comments
3 min read
Rule of Two Piece

Rule of Two Piece

Comments 1
7 min read
Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)
Cover image for Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.