Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Rise of Zero Trust in 2025 — Why It’s More Than Just a Buzzword
Cover image for The Rise of Zero Trust in 2025 — Why It’s More Than Just a Buzzword

The Rise of Zero Trust in 2025 — Why It’s More Than Just a Buzzword

Comments
2 min read
File Upload Security Issues

File Upload Security Issues

Comments
5 min read
How I Became an AWS Community Builder (Security) – My Real Journey + Application Guide
Cover image for How I Became an AWS Community Builder (Security) – My Real Journey + Application Guide

How I Became an AWS Community Builder (Security) – My Real Journey + Application Guide

2
Comments
2 min read
My Takeaways from AWS re:Invent 2025: Bringing the Vegas Energy Home to Hong Kong 🇭🇰✨
Cover image for My Takeaways from AWS re:Invent 2025: Bringing the Vegas Energy Home to Hong Kong 🇭🇰✨

My Takeaways from AWS re:Invent 2025: Bringing the Vegas Energy Home to Hong Kong 🇭🇰✨

6
Comments
3 min read
Is SQL Injection dead in 2025? Finding Critical Bugs in Item Pagination
Cover image for Is SQL Injection dead in 2025? Finding Critical Bugs in Item Pagination

Is SQL Injection dead in 2025? Finding Critical Bugs in Item Pagination

1
Comments
2 min read
Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security
Cover image for Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security

Scaling the Adversarial Mindset: How We're Using AI and Knowledge Graphs for Pre-emptive Security

Comments
4 min read
How to Protect Model Context Protocol (MCP) Servers with OpenAM and OpenIG

How to Protect Model Context Protocol (MCP) Servers with OpenAM and OpenIG

Comments
9 min read
I Don't Trust AWS (And Neither Should You): Dive into Intel SGX
Cover image for I Don't Trust AWS (And Neither Should You): Dive into Intel SGX

I Don't Trust AWS (And Neither Should You): Dive into Intel SGX

1
Comments 1
4 min read
Rust in the Linux Kernel: A New Dawn for Secure Systems?
Cover image for Rust in the Linux Kernel: A New Dawn for Secure Systems?

Rust in the Linux Kernel: A New Dawn for Secure Systems?

Comments
5 min read
🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide
Cover image for 🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide

🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide

Comments
4 min read
Day 6 — Image Hardening (The Audit)
Cover image for Day 6 — Image Hardening (The Audit)

Day 6 — Image Hardening (The Audit)

3
Comments
3 min read
Modernizing Legacy Workloads: KubeVirt on AKS with Azure Arc Identity

Modernizing Legacy Workloads: KubeVirt on AKS with Azure Arc Identity

Comments
9 min read
Jailbreaking LLMs: Understanding Prompt Injection Attacks

Jailbreaking LLMs: Understanding Prompt Injection Attacks

Comments
7 min read
IA dans DevSecOps

IA dans DevSecOps

Comments
3 min read
From Alerts to Answers: AWS Security Hub & Amazon Detective
Cover image for From Alerts to Answers: AWS Security Hub & Amazon Detective

From Alerts to Answers: AWS Security Hub & Amazon Detective

1
Comments
2 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
Linux firewall- iptables

Linux firewall- iptables

Comments
2 min read
Why We Don't Use Browser Extensions: The Clickjacking Problem

Why We Don't Use Browser Extensions: The Clickjacking Problem

Comments
5 min read
Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (Guía de Supervivencia)
Cover image for Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (Guía de Supervivencia)

Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (Guía de Supervivencia)

1
Comments
5 min read
AI Agents and context-aware permissions

AI Agents and context-aware permissions

Comments
8 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

Comments
3 min read
How to safely let AI Agents query your data: 5 Essential Layers

How to safely let AI Agents query your data: 5 Essential Layers

1
Comments
12 min read
The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works
Cover image for The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

The Magic Behind “Login with Google”: How OAuth 2.0 Actually Works

5
Comments
6 min read
Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Quantum Illusions: Can We Really Trust Our Entanglement Tests? by Arvind Sundararajan

Comments
2 min read
loading...