Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate
Cover image for Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Comments
2 min read
Your Perimeter Is Already Gone — Edge Security Isn't a Checkbox
Cover image for Your Perimeter Is Already Gone — Edge Security Isn't a Checkbox

Your Perimeter Is Already Gone — Edge Security Isn't a Checkbox

Comments
6 min read
Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate
Cover image for Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Silverfish IDP: A low cost, language‑first Internal Developer Portal for understanding your software estate

Comments
2 min read
Supply Chain Security in Next.js JavaScript Files with Subresource Integrity

Supply Chain Security in Next.js JavaScript Files with Subresource Integrity

Comments
9 min read
Privacidad por Diseño: Checklist técnico para la Ley 7593/2025
Cover image for Privacidad por Diseño: Checklist técnico para la Ley 7593/2025

Privacidad por Diseño: Checklist técnico para la Ley 7593/2025

Comments
3 min read
Cyblack internship Ethical hacking sprint write-up
Cover image for Cyblack internship Ethical hacking sprint write-up

Cyblack internship Ethical hacking sprint write-up

Comments
3 min read
Five Identity Frameworks. Three Gaps. One Pattern: They're All Cross-Org Problems.

Five Identity Frameworks. Three Gaps. One Pattern: They're All Cross-Org Problems.

Comments
4 min read
I Built a File Encryption App in Rust. Here’s What I Learned About Trust.

I Built a File Encryption App in Rust. Here’s What I Learned About Trust.

Comments
3 min read
GPT-5.4-Cyber and Mythos Are Here. Who Governs the Defenders' AI Agents?

GPT-5.4-Cyber and Mythos Are Here. Who Governs the Defenders' AI Agents?

Comments
5 min read
We Scanned 200 SMB Domains. Here's What We Found.

We Scanned 200 SMB Domains. Here's What We Found.

Comments
5 min read
Proving What Your AI Agent Did: Introducing Traceseal
Cover image for Proving What Your AI Agent Did: Introducing Traceseal

Proving What Your AI Agent Did: Introducing Traceseal

Comments
2 min read
Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Building a DevSecOps Pipeline: Shift Security Left Without Slowing Down

Comments
8 min read
I scanned the top 20 npm packages. Everyone passed CVE checks, but here's what the static analysis found

I scanned the top 20 npm packages. Everyone passed CVE checks, but here's what the static analysis found

1
Comments
3 min read
Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring

Slopsquatting: The AI Supply Chain Attack Vector You Are Not Monitoring

Comments
6 min read
Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform
Cover image for Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform

Hub-and-Spoke Topology with Azure Firewall - Deployment Guide with Terraform

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.