Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Creating production-ready authentication and authorization

Creating production-ready authentication and authorization

Comments
3 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness
Cover image for Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
How to Secure RabbitMQ & Celery with TLS/SSL

How to Secure RabbitMQ & Celery with TLS/SSL

Comments
1 min read
Agent Factory Recap: Can you do my shopping?

Agent Factory Recap: Can you do my shopping?

16
Comments
7 min read
AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

AWS DevSecOps: Deep Dive into Software Development, Security, and Operations Integration

Comments
7 min read
Hands-On: See Image Metadata Removal in Action
Cover image for Hands-On: See Image Metadata Removal in Action

Hands-On: See Image Metadata Removal in Action

120
Comments 2
6 min read
Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter
Cover image for Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

Your Database Isn’t a Teenager’s Bedroom: Why Privileges Actually Matter

1
Comments
3 min read
Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)
Cover image for Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)

Building Own Block Cipher: Part 2 — Block Cipher Theory & Rebuilding DES (Foundations You Can See)

Comments
6 min read
Why Some Android Games Resist NaĂŻve Reverse Engineering

Why Some Android Games Resist NaĂŻve Reverse Engineering

1
Comments 1
5 min read
Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams
Cover image for Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams

Safety vs Security in Software: A Practical Guide for Engineers and Infrastructure Teams

Comments
9 min read
Benchmark Report: Why Most Security Linters Miss 80% of Vulnerabilities
Cover image for Benchmark Report: Why Most Security Linters Miss 80% of Vulnerabilities

Benchmark Report: Why Most Security Linters Miss 80% of Vulnerabilities

Comments
6 min read
How to Test Image Rebuilding API: A Step-by-Step Guide
Cover image for How to Test Image Rebuilding API: A Step-by-Step Guide

How to Test Image Rebuilding API: A Step-by-Step Guide

104
Comments 2
4 min read
Matrix vs Signal Protocol: Why We Chose NOT to Federate

Matrix vs Signal Protocol: Why We Chose NOT to Federate

Comments
3 min read
Why another exchange architecture post?

Why another exchange architecture post?

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.