Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to use Okta to remotely authenticate to your BigQuery MCP Server

How to use Okta to remotely authenticate to your BigQuery MCP Server

3
Comments
6 min read
Security Options in WebForms Core 2
Cover image for Security Options in WebForms Core 2

Security Options in WebForms Core 2

Comments
3 min read
How Stargate Data Center Is Redefining High-Security Data Infrastructure?
Cover image for How Stargate Data Center Is Redefining High-Security Data Infrastructure?

How Stargate Data Center Is Redefining High-Security Data Infrastructure?

Comments
7 min read
Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Comments
9 min read
Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime
Cover image for Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Architectural Patterns for Securing Data: At Rest, In Transit, and At Runtime

Comments
14 min read
Math.random, friend or foe?
Cover image for Math.random, friend or foe?

Math.random, friend or foe?

Comments
5 min read
File Chunking: Why It Matters for Cybersecurity in Modern Applications

File Chunking: Why It Matters for Cybersecurity in Modern Applications

Comments
2 min read
From Vulnerable to Production-Ready: A Real-World Security Hardening Journey
Cover image for From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

From Vulnerable to Production-Ready: A Real-World Security Hardening Journey

Comments
12 min read
Automate Dynamic Application Security Testing (DAST) with CI/CD
Cover image for Automate Dynamic Application Security Testing (DAST) with CI/CD

Automate Dynamic Application Security Testing (DAST) with CI/CD

Comments
2 min read
Kubernetes validating admission policy and admission binding
Cover image for Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
FeetFinder & Background Checks: How Deep Do Employment Checks Go?

FeetFinder & Background Checks: How Deep Do Employment Checks Go?

Comments
4 min read
Practical Guide: Detailed Tutorial for Publishing HarmonyOS Apps

Practical Guide: Detailed Tutorial for Publishing HarmonyOS Apps

Comments
5 min read
Building a Production-Ready A2A Protocol Agent: A Technical Journey

Building a Production-Ready A2A Protocol Agent: A Technical Journey

1
Comments
4 min read
😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫
Cover image for 😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

12
Comments 2
3 min read
Building a safer cURL using TOR
Cover image for Building a safer cURL using TOR

Building a safer cURL using TOR

Comments
3 min read
How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

Comments
5 min read
Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It
Cover image for Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Comments
3 min read
The Silent Threat: Visually Triggered AI Hijacking

The Silent Threat: Visually Triggered AI Hijacking

Comments
2 min read
Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps
Cover image for Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Comments
6 min read
The Dark Side of Automation: When "Auto" Breaks Your Security Model
Cover image for The Dark Side of Automation: When "Auto" Breaks Your Security Model

The Dark Side of Automation: When "Auto" Breaks Your Security Model

Comments
7 min read
📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage
Cover image for 📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

20
Comments 2
5 min read
NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

NDC Conferences: Demystifying the Enigma Machine - a Functional Journey - Isaac Abraham - NDC Copenhagen 2025

Comments
1 min read
Zero-Trust with IAM and SCPs: A Practical Guide for Cloud Engineers
Cover image for Zero-Trust with IAM and SCPs: A Practical Guide for Cloud Engineers

Zero-Trust with IAM and SCPs: A Practical Guide for Cloud Engineers

Comments
2 min read
I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed
Cover image for I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed

I Built an Offline Git Secrets Scanner. No Cloud, No Telemetry, Just Speed

Comments
2 min read
Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI
Cover image for Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI

Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI

Comments
5 min read
loading...