Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Shellcode call calc.exe - Why cannot use C write shellcode

Shellcode call calc.exe - Why cannot use C write shellcode

1
Comments
2 min read
Secure-by-Default Authorization for MCP Servers powered by ToolHive
Cover image for Secure-by-Default Authorization for MCP Servers powered by ToolHive

Secure-by-Default Authorization for MCP Servers powered by ToolHive

9
Comments
9 min read
Replace Twilio-based OTP (SMS login) system with Azure Active Directory (Azure AD)

Replace Twilio-based OTP (SMS login) system with Azure Active Directory (Azure AD)

16
Comments 2
2 min read
Security is a risk function

Security is a risk function

Comments
1 min read
AdGuard Home Configuration for LAN-Only Access

AdGuard Home Configuration for LAN-Only Access

Comments
3 min read
AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift
Cover image for AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

1
Comments
7 min read
🛢️🗂️Database Version Control 🔝 Best Practice
Cover image for 🛢️🗂️Database Version Control 🔝 Best Practice

🛢️🗂️Database Version Control 🔝 Best Practice

10
Comments
4 min read
How can Desktop Apps Interact Securely with Web APIs

How can Desktop Apps Interact Securely with Web APIs

6
Comments
2 min read
Congrats to the Permit.io Authorization Challenge Winners!
Cover image for Congrats to the Permit.io Authorization Challenge Winners!

Congrats to the Permit.io Authorization Challenge Winners!

42
Comments 20
2 min read
Rate Limiting in Node.js Using Redis and Token Bucket Algorithm
Cover image for Rate Limiting in Node.js Using Redis and Token Bucket Algorithm

Rate Limiting in Node.js Using Redis and Token Bucket Algorithm

1
Comments
3 min read
Multi-Tenant 👥 Database Architecture Patterns Explained💬
Cover image for Multi-Tenant 👥 Database Architecture Patterns Explained💬

Multi-Tenant 👥 Database Architecture Patterns Explained💬

6
Comments
4 min read
Vibe Check: Securing AI-Generated Code Using MCP
Cover image for Vibe Check: Securing AI-Generated Code Using MCP

Vibe Check: Securing AI-Generated Code Using MCP

6
Comments
4 min read
Getting Authentication Right is Critical to Running MCP Servers
Cover image for Getting Authentication Right is Critical to Running MCP Servers

Getting Authentication Right is Critical to Running MCP Servers

10
Comments
6 min read
Mindgard - Automated AI Red Teaming & Security Testing

Mindgard - Automated AI Red Teaming & Security Testing

Comments
1 min read
Announcing Tigris’ SOC2 Type II Certification

Announcing Tigris’ SOC2 Type II Certification

Comments
2 min read
How To: Update AWS SRA in your Control Tower environment
Cover image for How To: Update AWS SRA in your Control Tower environment

How To: Update AWS SRA in your Control Tower environment

2
Comments
4 min read
Ethical Hacking vs Black Hat Hacking – What’s the Difference?

Ethical Hacking vs Black Hat Hacking – What’s the Difference?

Comments
3 min read
AWS IAM for Beginners: Understanding User Groups
Cover image for AWS IAM for Beginners: Understanding User Groups

AWS IAM for Beginners: Understanding User Groups

2
Comments
2 min read
How a job interview led me to create Obscura - A password generator with real entropy
Cover image for How a job interview led me to create Obscura - A password generator with real entropy

How a job interview led me to create Obscura - A password generator with real entropy

Comments
5 min read
Securing Kubernetes API Server Health Checks Without Anonymous Access

Securing Kubernetes API Server Health Checks Without Anonymous Access

1
Comments
3 min read
From Pizza Orders to Party Crashers: Understanding Web Security Threats

From Pizza Orders to Party Crashers: Understanding Web Security Threats

Comments
2 min read
The Importance of Security Measures for WordPress Websites and How WP Cerber Can Help
Cover image for The Importance of Security Measures for WordPress Websites and How WP Cerber Can Help

The Importance of Security Measures for WordPress Websites and How WP Cerber Can Help

Comments
4 min read
Implementing AWS SSO Integration with Jenkins
Cover image for Implementing AWS SSO Integration with Jenkins

Implementing AWS SSO Integration with Jenkins

15
Comments
4 min read
Strengthening Enterprise Security: Key Strategies and Best Practices

Strengthening Enterprise Security: Key Strategies and Best Practices

Comments
2 min read
Steps to Conduct a Network Security Audit
Cover image for Steps to Conduct a Network Security Audit

Steps to Conduct a Network Security Audit

Comments
3 min read
loading...