Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What Can AI See About You Right Now? I Built a Scanner to Find Out

What Can AI See About You Right Now? I Built a Scanner to Find Out

Comments
3 min read
ISO to SOC 2: What Compliance Actually Means for DevSecOps Engineers
Cover image for ISO to SOC 2: What Compliance Actually Means for DevSecOps Engineers

ISO to SOC 2: What Compliance Actually Means for DevSecOps Engineers

Comments
3 min read
Why Your Signup Form Is Less Secure Than You Think (And How to Fix It)
Cover image for Why Your Signup Form Is Less Secure Than You Think (And How to Fix It)

Why Your Signup Form Is Less Secure Than You Think (And How to Fix It)

Comments
4 min read
A Practical Guide to SLS Data Masking: Securing Sensitive Data in LLM Applications

A Practical Guide to SLS Data Masking: Securing Sensitive Data in LLM Applications

Comments
7 min read
I Built a Privacy Vault That Even AI Can't Read

I Built a Privacy Vault That Even AI Can't Read

Comments
4 min read
Adding an outbox, mail, tokens, CSRF, and more

Adding an outbox, mail, tokens, CSRF, and more

Comments
6 min read
OWASP Top 10 Explained: Real-World Vulnerabilities & How to Fix Them
Cover image for OWASP Top 10 Explained: Real-World Vulnerabilities & How to Fix Them

OWASP Top 10 Explained: Real-World Vulnerabilities & How to Fix Them

Comments
4 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Understanding Proxy IP Reputation and Why It Affects Your Success Rate

Understanding Proxy IP Reputation and Why It Affects Your Success Rate

1
Comments
2 min read
Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

2
Comments
4 min read
Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Comments
13 min read
Safer Pushes, SIEM Webhooks, and Verifiable Releases
Cover image for Safer Pushes, SIEM Webhooks, and Verifiable Releases

Safer Pushes, SIEM Webhooks, and Verifiable Releases

1
Comments
3 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.