Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Evaluating and Improving Proposed Architecture for Production Application Suitability

Evaluating and Improving Proposed Architecture for Production Application Suitability

Comments
14 min read
AI Vendor Lock-In Is Now a National Security Risk
Cover image for AI Vendor Lock-In Is Now a National Security Risk

AI Vendor Lock-In Is Now a National Security Risk

Comments
7 min read
How I Built an AI That Breeds Its Own Jailbreaks Using Genetic Algorithms

How I Built an AI That Breeds Its Own Jailbreaks Using Genetic Algorithms

6
Comments 2
3 min read
Cryptography Fundamentals: How Your Data Stays Secret in 2026
Cover image for Cryptography Fundamentals: How Your Data Stays Secret in 2026

Cryptography Fundamentals: How Your Data Stays Secret in 2026

Comments
8 min read
Why SRE Principles Are the Missing Layer in MCP Security

Why SRE Principles Are the Missing Layer in MCP Security

2
Comments 1
5 min read
I ran npm audit and DepGra on the same project — here's what each one caught

I ran npm audit and DepGra on the same project — here's what each one caught

Comments
4 min read
Cisco Just Invested in Agent Identity Monitoring. Security Boulevard Says Your IAM Was Not Built for This.

Cisco Just Invested in Agent Identity Monitoring. Security Boulevard Says Your IAM Was Not Built for This.

1
Comments
3 min read
Making rate limiting in AWS less terrible
Cover image for Making rate limiting in AWS less terrible

Making rate limiting in AWS less terrible

11
Comments
54 min read
stop using websites to decode JWTs — do it in the terminal

stop using websites to decode JWTs — do it in the terminal

Comments
4 min read
AWS Secrets Manager: Secure Credential Management
Cover image for AWS Secrets Manager: Secure Credential Management

AWS Secrets Manager: Secure Credential Management

Comments
6 min read
AI Writes Your Code. Who Is Accountable?

AI Writes Your Code. Who Is Accountable?

Comments
4 min read
How SSH Works—and How It Breaks: A Practical Guide to Secure Remote Access

How SSH Works—and How It Breaks: A Practical Guide to Secure Remote Access

2
Comments
8 min read
Why AI Agents Need Their Own Authorization Protocol (and How We Built One)
Cover image for Why AI Agents Need Their Own Authorization Protocol (and How We Built One)

Why AI Agents Need Their Own Authorization Protocol (and How We Built One)

Comments
3 min read
JWT Token Explained: How to Decode, Debug, and Secure Your Tokens

JWT Token Explained: How to Decode, Debug, and Secure Your Tokens

Comments 1
1 min read
I Spent a Week Securing Webhook Ingestion. The Real Attack Surface Was Delivery.

I Spent a Week Securing Webhook Ingestion. The Real Attack Surface Was Delivery.

1
Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.