Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The 5 Identity Controls Every Modern Enterprise Is Missing in 2025
Cover image for The 5 Identity Controls Every Modern Enterprise Is Missing in 2025

The 5 Identity Controls Every Modern Enterprise Is Missing in 2025

Comments
1 min read
📅 Day 8 — Inbound & Outbound Rules in AWS Security Groups
Cover image for 📅 Day 8 — Inbound & Outbound Rules in AWS Security Groups

📅 Day 8 — Inbound & Outbound Rules in AWS Security Groups

Comments
2 min read
How to Secure Your Python Project (A Practical Guide)

How to Secure Your Python Project (A Practical Guide)

Comments
2 min read
Critical High-Risk Alert: Severe Remote Code Execution Vulnerability in Next.js and React (CVE-2025-66478 / CVE-2025-55182)

Critical High-Risk Alert: Severe Remote Code Execution Vulnerability in Next.js and React (CVE-2025-66478 / CVE-2025-55182)

Comments
4 min read
Building a Keyword Density Checker: Algorithm and Implementation

Building a Keyword Density Checker: Algorithm and Implementation

Comments
7 min read
Building a Cost-Effective Autonomous Threat Containment System on AWS
Cover image for Building a Cost-Effective Autonomous Threat Containment System on AWS

Building a Cost-Effective Autonomous Threat Containment System on AWS

Comments
4 min read
Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Securing My Stack: Features and Experience Integrating Asgardeo, Ballerina, and Choreo

Comments
3 min read
Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Catching .NET Vulnerabilities Early: A Hands-On Guide with Puma Scan

Comments
2 min read
Role Based Access Control in SeaORM 2.0
Cover image for Role Based Access Control in SeaORM 2.0

Role Based Access Control in SeaORM 2.0

Comments
9 min read
how do you trust a third party API?
Cover image for how do you trust a third party API?

how do you trust a third party API?

Comments 1
2 min read
How I built a RAM-only chat app that logs absolutely nothing (Node.js + Redis)

How I built a RAM-only chat app that logs absolutely nothing (Node.js + Redis)

5
Comments
1 min read
Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Comments
1 min read
How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare
Cover image for How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

How Avoiding Next.js Turned Into a 9.8 CVE-Level Security Nightmare

Comments
3 min read
Building SENTINEL: How I Turned Network Packets Into Ghosts

Building SENTINEL: How I Turned Network Packets Into Ghosts

Comments
8 min read
Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Designing a Secure Digital Receipt Protocol (DRP) with Derived Identities, AES-GCM & Ed25519 Signatures

Comments
5 min read
Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Quantum Shadows: Can Eavesdroppers Erase Unbreakable Encryption?

Comments
2 min read
# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master
Cover image for # Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

# Unlocking SSH Security: Private Keys vs. Public Keys – The Asymmetric Duo Every Dev Must Master

Comments
3 min read
Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform
Cover image for Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform

Enriching Vault OIDC Tokens with SPIFFE Identity Metadata using Terraform

Comments
3 min read
Hello World is Hard: Surviving the SGX Setup
Cover image for Hello World is Hard: Surviving the SGX Setup

Hello World is Hard: Surviving the SGX Setup

1
Comments 1
5 min read
Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage
Cover image for Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

1
Comments
2 min read
# Mastering SSH: Why Every Backend Developer Needs This Secure Superpower
Cover image for # Mastering SSH: Why Every Backend Developer Needs This Secure Superpower

# Mastering SSH: Why Every Backend Developer Needs This Secure Superpower

Comments
2 min read
You Thought Frida Was Stealth When Not Attached? Dirty Pages Beg to Differ

You Thought Frida Was Stealth When Not Attached? Dirty Pages Beg to Differ

Comments
2 min read
🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves

🛡️ Laravel Secure Baseline: The Guardian Your Pipeline Deserves

Comments
3 min read
Product Engineering for Fintech Startups: Accelerating Compliance and Growth
Cover image for Product Engineering for Fintech Startups: Accelerating Compliance and Growth

Product Engineering for Fintech Startups: Accelerating Compliance and Growth

Comments
4 min read
Best Beginner’s Guide For Cybersecurity Recon with Python
Cover image for Best Beginner’s Guide For Cybersecurity Recon with Python

Best Beginner’s Guide For Cybersecurity Recon with Python

Comments
8 min read
loading...