Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Okta Tokens

Understanding Okta Tokens

Comments
2 min read
Building Tamper-Proof Audit Trails: How VCP v1.1's Three-Layer Architecture Addresses €150M in Regulatory Failures
Cover image for Building Tamper-Proof Audit Trails: How VCP v1.1's Three-Layer Architecture Addresses €150M in Regulatory Failures

Building Tamper-Proof Audit Trails: How VCP v1.1's Three-Layer Architecture Addresses €150M in Regulatory Failures

1
Comments
15 min read
Building Secure JWT Auth in NestJS: Argon2, Redis Blacklisting, and Token Rotation
Cover image for Building Secure JWT Auth in NestJS: Argon2, Redis Blacklisting, and Token Rotation

Building Secure JWT Auth in NestJS: Argon2, Redis Blacklisting, and Token Rotation

1
Comments
7 min read
Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar
Cover image for Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

Quantum Doomsday Delayed (Again): Why the Latest Panic Over Post-Quantum Cryptography Feels Familiar

1
Comments
4 min read
Stop Your AI Agent from Leaking API Keys, Private Keys, and PII
Cover image for Stop Your AI Agent from Leaking API Keys, Private Keys, and PII

Stop Your AI Agent from Leaking API Keys, Private Keys, and PII

Comments
5 min read
The Deterministic SOC2 API
Cover image for The Deterministic SOC2 API

The Deterministic SOC2 API

Comments
3 min read
OpenClaw vs AutoGPT vs CrewAI: Which AI Agent Framework Should You Use in 2026?

OpenClaw vs AutoGPT vs CrewAI: Which AI Agent Framework Should You Use in 2026?

Comments 1
7 min read
Why Permission Boundary Didn’t Restrict AmazonEC2FullAccess — Complete AWS IAM Debugging Guide

Why Permission Boundary Didn’t Restrict AmazonEC2FullAccess — Complete AWS IAM Debugging Guide

3
Comments
3 min read
Beyond the Buzzwords: 5 Counter-Intuitive Lessons in System Design
Cover image for Beyond the Buzzwords: 5 Counter-Intuitive Lessons in System Design

Beyond the Buzzwords: 5 Counter-Intuitive Lessons in System Design

Comments
7 min read
Automating AWS Security Scanning: Configuring Prowler on EC2 as a Cron Job to Detect Outdated AMIs

Automating AWS Security Scanning: Configuring Prowler on EC2 as a Cron Job to Detect Outdated AMIs

Comments
13 min read
[Learning Notes] [Golang] How to Develop OAuth2 PKCE with Golang - Using LINE Login as an Example

[Learning Notes] [Golang] How to Develop OAuth2 PKCE with Golang - Using LINE Login as an Example

Comments
8 min read
[TW_DevRel] TECH-Verse 2022: Interesting Agenda Highlights - Day 1

[TW_DevRel] TECH-Verse 2022: Interesting Agenda Highlights - Day 1

Comments
3 min read
What Backend Developers Should Know About Passkeys (WWDC22)

What Backend Developers Should Know About Passkeys (WWDC22)

Comments
4 min read
MCP Weekly: EU Challenges Meta, OpenAI Targets Enterprise, and Claude Opus 4.6 Arrives
Cover image for MCP Weekly: EU Challenges Meta, OpenAI Targets Enterprise, and Claude Opus 4.6 Arrives

MCP Weekly: EU Challenges Meta, OpenAI Targets Enterprise, and Claude Opus 4.6 Arrives

19
Comments 2
2 min read
Kubernetes: About Kubernetes

Kubernetes: About Kubernetes

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.