Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When Smart Devices Stop Working Offline
Cover image for When Smart Devices Stop Working Offline

When Smart Devices Stop Working Offline

2
Comments
3 min read
Secuditor Lite – Diagnostic Security Tool for Windows Endpoints

Secuditor Lite – Diagnostic Security Tool for Windows Endpoints

1
Comments
2 min read
🔐 Observability Through Security Assessment
Cover image for 🔐 Observability Through Security Assessment

🔐 Observability Through Security Assessment

Comments
2 min read
Why Modern AppSec Needs Location-Aware Security Testing
Cover image for Why Modern AppSec Needs Location-Aware Security Testing

Why Modern AppSec Needs Location-Aware Security Testing

Comments
4 min read
How Piracy and Cheating Kill Revenue for Indie Games
Cover image for How Piracy and Cheating Kill Revenue for Indie Games

How Piracy and Cheating Kill Revenue for Indie Games

1
Comments
5 min read
CORS: The Traffic Guard You Actually Need (And How It Protects User Sessions)

CORS: The Traffic Guard You Actually Need (And How It Protects User Sessions)

5
Comments 1
3 min read
The MCP server security problem nobody is talking about

The MCP server security problem nobody is talking about

Comments 1
2 min read
Mutating vs Validating Webhooks in Kubernetes
Cover image for Mutating vs Validating Webhooks in Kubernetes

Mutating vs Validating Webhooks in Kubernetes

2
Comments
3 min read
Auditly - Enterprise Python Dependency Vulnerability Scanner
Cover image for Auditly - Enterprise Python Dependency Vulnerability Scanner

Auditly - Enterprise Python Dependency Vulnerability Scanner

Comments
3 min read
Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance
Cover image for Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Building a Camera That Cannot Lie: How VeriCapture's CPP Implementation Advances Verifiable Provenance

Comments
7 min read
Secure MCP Development with Python and Gemini CLI

Secure MCP Development with Python and Gemini CLI

9
Comments
7 min read
Choosing and Configuring Azure Storage for Your Company Application
Cover image for Choosing and Configuring Azure Storage for Your Company Application

Choosing and Configuring Azure Storage for Your Company Application

5
Comments 1
5 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops
Cover image for The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
Lock N' Key : The Developer's Vault
Cover image for Lock N' Key : The Developer's Vault

Lock N' Key : The Developer's Vault

Comments
2 min read
AES vs ChaCha20: Explained While Building Real Crypto Tools
Cover image for AES vs ChaCha20: Explained While Building Real Crypto Tools

AES vs ChaCha20: Explained While Building Real Crypto Tools

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.