Forem

Security

Hopefully not just an afterthought!

Posts

πŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why NISTIR 8286 Matters for Cybersecurity and Business Teams

Why NISTIR 8286 Matters for Cybersecurity and Business Teams

Comments
2 min read
How Developers Can Use NISTIR 8286 to Improve Risk Visibility

How Developers Can Use NISTIR 8286 to Improve Risk Visibility

Comments
2 min read
Dev-Friendly NISTIR 8286 Guide for Cyber & Enterprise Risk

Dev-Friendly NISTIR 8286 Guide for Cyber & Enterprise Risk

Comments
2 min read
Review of CWE-843 Type Confusion Vulnerability and Exploit
Cover image for Review of CWE-843 Type Confusion Vulnerability and Exploit

Review of CWE-843 Type Confusion Vulnerability and Exploit

Comments
6 min read
Secure Your Android App with Biometric SDK in 5 Minutes πŸ” (Kotlin)
Cover image for Secure Your Android App with Biometric SDK in 5 Minutes πŸ” (Kotlin)

Secure Your Android App with Biometric SDK in 5 Minutes πŸ” (Kotlin)

Comments 1
3 min read
Security news weekly round-up - 1st August 2025
Cover image for Security news weekly round-up - 1st August 2025

Security news weekly round-up - 1st August 2025

1
Comments
3 min read
Are Card Payments Really Safer Than You Think?
Cover image for Are Card Payments Really Safer Than You Think?

Are Card Payments Really Safer Than You Think?

12
Comments
6 min read
The Compliance Crisis: Why Your Enterprise Meeting Data is a Ticking Time Bomb
Cover image for The Compliance Crisis: Why Your Enterprise Meeting Data is a Ticking Time Bomb

The Compliance Crisis: Why Your Enterprise Meeting Data is a Ticking Time Bomb

Comments
6 min read
Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection
Cover image for Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection

Building AgentSmith-HUB: A High-Performance Security Data Pipeline with Real-Time Detection

Comments
3 min read
πŸ“± August: Securing the Device in Everyone’s Pocket
Cover image for πŸ“± August: Securing the Device in Everyone’s Pocket

πŸ“± August: Securing the Device in Everyone’s Pocket

Comments
3 min read
Code Security Series Memory Management in Programming: Taming the Wild Beast of Bytes
Cover image for Code Security Series Memory Management in Programming: Taming the Wild Beast of Bytes

Code Security Series Memory Management in Programming: Taming the Wild Beast of Bytes

Comments
5 min read
OpenResty Manager
Cover image for OpenResty Manager

OpenResty Manager

Comments
2 min read
ShellGuard: Building an AI-Assisted Command Approval System for SSH Security
Cover image for ShellGuard: Building an AI-Assisted Command Approval System for SSH Security

ShellGuard: Building an AI-Assisted Command Approval System for SSH Security

Comments
5 min read
The Untold Misadventures of Red Teaming Kimi K2 with Promptfoo
Cover image for The Untold Misadventures of Red Teaming Kimi K2 with Promptfoo

The Untold Misadventures of Red Teaming Kimi K2 with Promptfoo

5
Comments
14 min read
Strengthening Web Security with HTTP Headers in Express.js

Strengthening Web Security with HTTP Headers in Express.js

Comments
3 min read
How to export indicators from XSOAR to Splunk
Cover image for How to export indicators from XSOAR to Splunk

How to export indicators from XSOAR to Splunk

Comments
3 min read
Building an Azure Misconfiguration Scanner: Starting Over

Building an Azure Misconfiguration Scanner: Starting Over

Comments
2 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
πŸ•΅οΈ JavaScript powers the modern web β€” and tracks you in ways you don’t expect

πŸ•΅οΈ JavaScript powers the modern web β€” and tracks you in ways you don’t expect

Comments
1 min read
Manage Tags and Locks on VMs
Cover image for Manage Tags and Locks on VMs

Manage Tags and Locks on VMs

Comments
2 min read
Day 1/50 Basics on cyber security & web2
Cover image for Day 1/50 Basics on cyber security & web2

Day 1/50 Basics on cyber security & web2

1
Comments
2 min read
πŸš€ Speed Up containerd Image Pulls with These Proven Techniques
Cover image for πŸš€ Speed Up containerd Image Pulls with These Proven Techniques

πŸš€ Speed Up containerd Image Pulls with These Proven Techniques

Comments
3 min read
Building an Azure Misconfiguration Scanner: Week 1 of My 90-Day Challenge

Building an Azure Misconfiguration Scanner: Week 1 of My 90-Day Challenge

Comments
2 min read
🧱 containerd vs Docker: What's Really Happening Under the Hood?
Cover image for 🧱 containerd vs Docker: What's Really Happening Under the Hood?

🧱 containerd vs Docker: What's Really Happening Under the Hood?

Comments
3 min read
Why security isn't just an afterthought?
Cover image for Why security isn't just an afterthought?

Why security isn't just an afterthought?

Comments
1 min read
loading...