Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementing RBAC in Azure for Secure Resource Group Access
Cover image for Implementing RBAC in Azure for Secure Resource Group Access

Implementing RBAC in Azure for Secure Resource Group Access

Comments
5 min read
3 Reasons Every Tech Enthusiast Needs a Disposable Email in 2026

3 Reasons Every Tech Enthusiast Needs a Disposable Email in 2026

Comments
2 min read
The RPC Delusion: Architecting Byzantine Fault Tolerance for Web3 Agents
Cover image for The RPC Delusion: Architecting Byzantine Fault Tolerance for Web3 Agents

The RPC Delusion: Architecting Byzantine Fault Tolerance for Web3 Agents

1
Comments
4 min read
The dog that didn't bark: finding security holes in what's missing, not what's misconfigured

The dog that didn't bark: finding security holes in what's missing, not what's misconfigured

Comments
7 min read
Mini-App Container vs Cross-Platform Solutions
Cover image for Mini-App Container vs Cross-Platform Solutions

Mini-App Container vs Cross-Platform Solutions

Comments
3 min read
Deep Decryption of OpenAI's Anti-Gray Market Registration: "Outsourcing" Risk Control and "Deterring" via Costs

Deep Decryption of OpenAI's Anti-Gray Market Registration: "Outsourcing" Risk Control and "Deterring" via Costs

Comments
20 min read
Fake AI Installers: When "Installing Claude" Turns Into Running Malware
Cover image for Fake AI Installers: When "Installing Claude" Turns Into Running Malware

Fake AI Installers: When "Installing Claude" Turns Into Running Malware

1
Comments
9 min read
I built something I think more developers should be using

I built something I think more developers should be using

Comments
1 min read
Vulnerability Scan vs Penetration Test: What Small Teams Actually Need
Cover image for Vulnerability Scan vs Penetration Test: What Small Teams Actually Need

Vulnerability Scan vs Penetration Test: What Small Teams Actually Need

Comments
7 min read
Agents can pay. They can't prove they were supposed to.

Agents can pay. They can't prove they were supposed to.

Comments
3 min read
Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide
Cover image for Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

1
Comments 1
11 min read
JWT Authentication — 7 Common Mistakes Developers Make (And How to Fix Them)

JWT Authentication — 7 Common Mistakes Developers Make (And How to Fix Them)

1
Comments
3 min read
ML-KEM: Future of Key Encapsulation

ML-KEM: Future of Key Encapsulation

Comments
12 min read
Reproducible Builds: The Only Way to Verify Your Software Wasn't Tampered With

Reproducible Builds: The Only Way to Verify Your Software Wasn't Tampered With

Comments
5 min read
5 Critical Security Mistakes PHP Beginners Make in 2026 (And How to Fix Them)

5 Critical Security Mistakes PHP Beginners Make in 2026 (And How to Fix Them)

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.