Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unlocking AI's Secrets: The Prompt Seed Treasure Hunt by Arvind Sundararajan

Unlocking AI's Secrets: The Prompt Seed Treasure Hunt by Arvind Sundararajan

5
Comments
2 min read
Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

Fort Knox AI: Verifiable Security for Distributed Machine Learning by Arvind Sundararajan

5
Comments
2 min read
Securing Sessions in Spring Boot
Cover image for Securing Sessions in Spring Boot

Securing Sessions in Spring Boot

2
Comments
3 min read
CipherVault – Lightweight Browser-Based Encryption Tool
Cover image for CipherVault – Lightweight Browser-Based Encryption Tool

CipherVault – Lightweight Browser-Based Encryption Tool

Comments
1 min read
Lazy-Loading as a Security Measure
Cover image for Lazy-Loading as a Security Measure

Lazy-Loading as a Security Measure

37
Comments 20
4 min read
Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)
Cover image for Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

Vulnerability Remediation (Cybersecurity Patch) by Strengthening Cryptography & Data Protection (OWASP A02)

7
Comments
3 min read
SIM Bank: Legal and Illegal Uses, and Detection through Digital Forensics

SIM Bank: Legal and Illegal Uses, and Detection through Digital Forensics

Comments
3 min read
Guardian AI: Zero-Knowledge Proofs for Secure Split Learning

Guardian AI: Zero-Knowledge Proofs for Secure Split Learning

5
Comments
2 min read
AI Chatbot Developers: What's the "Other Safety" We Should Be Thinking About Now? User Protection.
Cover image for AI Chatbot Developers: What's the "Other Safety" We Should Be Thinking About Now? User Protection.

AI Chatbot Developers: What's the "Other Safety" We Should Be Thinking About Now? User Protection.

5
Comments
24 min read
🏢 The Next 50 Years of DevOps: Data Centers, Security, and the GPU-Driven AI Revolution

🏢 The Next 50 Years of DevOps: Data Centers, Security, and the GPU-Driven AI Revolution

3
Comments
3 min read
Audio Deepfakes: The Illusion of Security in Voice Biometrics

Audio Deepfakes: The Illusion of Security in Voice Biometrics

1
Comments
2 min read
My Path to Decentralization

My Path to Decentralization

1
Comments
4 min read
Πώς κινείται το χρήμα σε μια ηλεκτρονική συναλλαγή μέσω PayGate

Πώς κινείται το χρήμα σε μια ηλεκτρονική συναλλαγή μέσω PayGate

1
Comments
1 min read
How to Manage WireGuard VPN Connection in GNOME Without the wireguard-tools
Cover image for How to Manage WireGuard VPN Connection in GNOME Without the wireguard-tools

How to Manage WireGuard VPN Connection in GNOME Without the wireguard-tools

Comments
3 min read
Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation
Cover image for Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation

Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.