Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Beyond API Keys: Token Exchange, Identity Federation & MCP Servers

Beyond API Keys: Token Exchange, Identity Federation & MCP Servers

7
Comments
5 min read
What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

Comments
6 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner
Cover image for Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

6
Comments 1
5 min read
How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™
Cover image for How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

4
Comments
5 min read
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
Cover image for Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats

Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats

4
Comments 1
9 min read
7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

Comments
3 min read
How to use JWTokens properly

How to use JWTokens properly

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers
Cover image for 🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

7
Comments 7
6 min read
7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
Checklist of email deliverability tips for B2B marketers

Checklist of email deliverability tips for B2B marketers

Comments
1 min read
Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Comments
2 min read
Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails
Cover image for Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails

Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails

Comments
6 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.