Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Built a Claude Code Slash Command for OWASP Top 10:2025, NIST CSF 2.0 and 850+ Security Checks

I Built a Claude Code Slash Command for OWASP Top 10:2025, NIST CSF 2.0 and 850+ Security Checks

1
Comments
6 min read
Implementing the Agentic Trust Framework: Zero Trust for AI Agents

Implementing the Agentic Trust Framework: Zero Trust for AI Agents

Comments
3 min read
SCRIPTED CI: Governing Your Build Pipeline as Critical Infrastructure
Cover image for SCRIPTED CI: Governing Your Build Pipeline as Critical Infrastructure

SCRIPTED CI: Governing Your Build Pipeline as Critical Infrastructure

5
Comments 1
4 min read
Xcode 26.3 : Apple AI vs External Agentic AI: Balancing Productivity and Security
Cover image for Xcode 26.3 : Apple AI vs External Agentic AI: Balancing Productivity and Security

Xcode 26.3 : Apple AI vs External Agentic AI: Balancing Productivity and Security

Comments
2 min read
Practical Strategies for Securing Web APIs in Modern Applications

Practical Strategies for Securing Web APIs in Modern Applications

Comments
3 min read
How OpenPawz secures AI agents: Defense layers from memory encryption to multi-agent governance
Cover image for How OpenPawz secures AI agents: Defense layers from memory encryption to multi-agent governance

How OpenPawz secures AI agents: Defense layers from memory encryption to multi-agent governance

6
Comments
11 min read
Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design

Building a Secure Email Migration Tool: OAuth, Encryption, and Privacy by Design

Comments
4 min read
We Scanned 17 Popular MCP Servers — Here's What We Found

We Scanned 17 Popular MCP Servers — Here's What We Found

3
Comments 4
4 min read
MCP tool spoofing succeeds 100% of the time. A new paper maps 12 security risks across 4 agent protocols.

MCP tool spoofing succeeds 100% of the time. A new paper maps 12 security risks across 4 agent protocols.

3
Comments 2
3 min read
Beyond the Match: A Practitioner’s Guide to Biometric Authentication Metrics

Beyond the Match: A Practitioner’s Guide to Biometric Authentication Metrics

1
Comments
5 min read
Secure Image Uploads in Blazor Rich Text Editor Using JWT
Cover image for Secure Image Uploads in Blazor Rich Text Editor Using JWT

Secure Image Uploads in Blazor Rich Text Editor Using JWT

Comments
7 min read
“Shattle on macOS: When Gatekeeper Fails Silently and How I Got Past It”

“Shattle on macOS: When Gatekeeper Fails Silently and How I Got Past It”

Comments
3 min read
Designing Zero-Trust CI/CD Pipelines with GitHub Actions and AWS

Designing Zero-Trust CI/CD Pipelines with GitHub Actions and AWS

1
Comments
3 min read
đź‘» Living Off The Land Evasion
Cover image for đź‘» Living Off The Land Evasion

đź‘» Living Off The Land Evasion

Comments
5 min read
Docker Security Hardening: 10 Practices That Will Protect Your Containers in Production

Docker Security Hardening: 10 Practices That Will Protect Your Containers in Production

2
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.