Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why WebAuthn Feels Easy — Until You Try to Ship It

Why WebAuthn Feels Easy — Until You Try to Ship It

Comments
2 min read
Most “Private” Apps Still Leak More Than You Think
Cover image for Most “Private” Apps Still Leak More Than You Think

Most “Private” Apps Still Leak More Than You Think

Comments
2 min read
The Future of IaC Security: Scanning, Drift Detection and Autoremediation
Cover image for The Future of IaC Security: Scanning, Drift Detection and Autoremediation

The Future of IaC Security: Scanning, Drift Detection and Autoremediation

Comments
6 min read
Logging Into EC2 Is Easy… Until You Pick the Wrong Way
Cover image for Logging Into EC2 Is Easy… Until You Pick the Wrong Way

Logging Into EC2 Is Easy… Until You Pick the Wrong Way

1
Comments 1
3 min read
HealthTech API Security: Protecting Patient Data with mTLS and OAuth 2.0

HealthTech API Security: Protecting Patient Data with mTLS and OAuth 2.0

Comments
3 min read
Building a Fail-Closed Investment Risk Gate with Yuer DSL

Building a Fail-Closed Investment Risk Gate with Yuer DSL

Comments
3 min read
Passkey Login & Smart Wallet Creation on Solana with React Native and LazorKit — No More Seed Phrases!

Passkey Login & Smart Wallet Creation on Solana with React Native and LazorKit — No More Seed Phrases!

Comments
9 min read
AWS Bedrock Security Best Practices: Building Secure Generative AI Applications
Cover image for AWS Bedrock Security Best Practices: Building Secure Generative AI Applications

AWS Bedrock Security Best Practices: Building Secure Generative AI Applications

Comments
4 min read
I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)
Cover image for I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)

I Accidentally Exposed My API Keys to 50,000 Users (And How You Can Avoid My $3,000 Mistake)

Comments
5 min read
Don't Trust the Client: How I Hacked My Own Coupon System

Don't Trust the Client: How I Hacked My Own Coupon System

Comments
2 min read
Why cookies are unreliable for identifying users

Why cookies are unreliable for identifying users

Comments
2 min read
Data Security in Salesforce: Understanding the Layers That Protect Your Data
Cover image for Data Security in Salesforce: Understanding the Layers That Protect Your Data

Data Security in Salesforce: Understanding the Layers That Protect Your Data

Comments
8 min read
Why Rust?

Why Rust?

1
Comments
3 min read
Building a RAM-Only, End-to-End Encrypted Chat for the Terminal (Python)

Building a RAM-Only, End-to-End Encrypted Chat for the Terminal (Python)

Comments
1 min read
Undo Beats IQ: Building Flamehaven as a Governed AI Runtime (Not a Prompt App)

Undo Beats IQ: Building Flamehaven as a Governed AI Runtime (Not a Prompt App)

Comments
2 min read
Honeypot Fields: Bot Protection That's Free and Takes 5 Minutes

Honeypot Fields: Bot Protection That's Free and Takes 5 Minutes

Comments
4 min read
Web Application Security & XSS Mitigation Lab

Web Application Security & XSS Mitigation Lab

Comments
1 min read
Run Any MCP Server Securely Without Changing Its Config
Cover image for Run Any MCP Server Securely Without Changing Its Config

Run Any MCP Server Securely Without Changing Its Config

Comments
4 min read
Bypassing SSL Pinning with Frida: Advanced Mobile Scraping
Cover image for Bypassing SSL Pinning with Frida: Advanced Mobile Scraping

Bypassing SSL Pinning with Frida: Advanced Mobile Scraping

Comments
7 min read
Bloom: Anthropic’s Tool That Changes How We Evaluate AI Safety

Bloom: Anthropic’s Tool That Changes How We Evaluate AI Safety

Comments
7 min read
System Design Autopsy: How 1 Legacy Portal Cost $1.6B (Change Healthcare Analysis)
Cover image for System Design Autopsy: How 1 Legacy Portal Cost $1.6B (Change Healthcare Analysis)

System Design Autopsy: How 1 Legacy Portal Cost $1.6B (Change Healthcare Analysis)

Comments
1 min read
Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis
Cover image for Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis

Why Detection Lost: Building Cryptographic Provenance for the Synthetic Media Crisis

Comments
10 min read
Securing the X402 Protocol: Why Autonomous Agent Payments Need Spending Controls

Securing the X402 Protocol: Why Autonomous Agent Payments Need Spending Controls

Comments
8 min read
Zero-Trust in Internal Microservices: Service Security with an API Gateway
Cover image for Zero-Trust in Internal Microservices: Service Security with an API Gateway

Zero-Trust in Internal Microservices: Service Security with an API Gateway

1
Comments
7 min read
The MCP Revolution: How One Protocol Solved AI's Biggest Integration Problem (Part 1 of 2)

The MCP Revolution: How One Protocol Solved AI's Biggest Integration Problem (Part 1 of 2)

1
Comments 1
5 min read
loading...