Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
I Built a Security Scanner Because AI Code Scared Me

I Built a Security Scanner Because AI Code Scared Me

1
Comments
5 min read
Adding an outbox, mail, tokens, CSRF, and more

Adding an outbox, mail, tokens, CSRF, and more

Comments
6 min read
I Built a Privacy Vault That Even AI Can't Read

I Built a Privacy Vault That Even AI Can't Read

Comments
4 min read
I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

I scanned popular open source projects for quantum-vulnerable crypto. Here's what I found.

Comments
3 min read
Understanding Proxy IP Reputation and Why It Affects Your Success Rate

Understanding Proxy IP Reputation and Why It Affects Your Success Rate

1
Comments
2 min read
Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

2
Comments
4 min read
Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Comments
13 min read
Safer Pushes, SIEM Webhooks, and Verifiable Releases
Cover image for Safer Pushes, SIEM Webhooks, and Verifiable Releases

Safer Pushes, SIEM Webhooks, and Verifiable Releases

1
Comments
3 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
Security Trimming with Microsoft 365 Copilot: Asking the Right Data in the Right Context

Security Trimming with Microsoft 365 Copilot: Asking the Right Data in the Right Context

1
Comments
10 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

2
Comments
2 min read
We built post-quantum encrypted email that works with Gmail. Here's how.

We built post-quantum encrypted email that works with Gmail. Here's how.

1
Comments 1
2 min read
How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.