Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Threat Modeling in DevOps
Cover image for 🔐 Threat Modeling in DevOps

🔐 Threat Modeling in DevOps

Comments
3 min read
SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

SonarQube: SCA Scanning of Unmanaged Dependencies in Java Projects with Syft and SBOM Import

1
Comments
1 min read
Introducing graphql-safe-guards: predictable GraphQL query safety

Introducing graphql-safe-guards: predictable GraphQL query safety

1
Comments
1 min read
Does Your App Reveal Its Server Header? You Might Be Helping Attackers
Cover image for Does Your App Reveal Its Server Header? You Might Be Helping Attackers

Does Your App Reveal Its Server Header? You Might Be Helping Attackers

3
Comments
3 min read
Dissecting Digital Viruses: My First Steps in Malware Analysis
Cover image for Dissecting Digital Viruses: My First Steps in Malware Analysis

Dissecting Digital Viruses: My First Steps in Malware Analysis

Comments
2 min read
How to Check Your SSL Certificate (And Why It Matters)

How to Check Your SSL Certificate (And Why It Matters)

Comments 2
3 min read
CVE-2026-23518: Fleet Fiasco: The Unverified JWT That Opened the Gates

CVE-2026-23518: Fleet Fiasco: The Unverified JWT That Opened the Gates

Comments
2 min read
🔍 Software Composition Analysis (SCA)
Cover image for 🔍 Software Composition Analysis (SCA)

🔍 Software Composition Analysis (SCA)

Comments
2 min read
Real-time Malicious Package Protection for AI Coding Agents

Real-time Malicious Package Protection for AI Coding Agents

1
Comments
2 min read
A quick guide to Python's Dictionary
Cover image for A quick guide to Python's Dictionary

A quick guide to Python's Dictionary

Comments 1
3 min read
The AI Agent Security Gap Nobody Is Talking About
Cover image for The AI Agent Security Gap Nobody Is Talking About

The AI Agent Security Gap Nobody Is Talking About

1
Comments 1
4 min read
Understanding RSA: A Simple Guide to Public-Key Math
Cover image for Understanding RSA: A Simple Guide to Public-Key Math

Understanding RSA: A Simple Guide to Public-Key Math

6
Comments 2
3 min read
Rate Limiting Access Codes: The Delicate Balance Between Security and UX
Cover image for Rate Limiting Access Codes: The Delicate Balance Between Security and UX

Rate Limiting Access Codes: The Delicate Balance Between Security and UX

1
Comments
2 min read
Setting Up NextJS 13 with Auth0 and Sub-Domains: A Guide to Multi-Tenancy Web Apps

Setting Up NextJS 13 with Auth0 and Sub-Domains: A Guide to Multi-Tenancy Web Apps

Comments
5 min read
When Smart Devices Stop Working Offline
Cover image for When Smart Devices Stop Working Offline

When Smart Devices Stop Working Offline

2
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.