Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus
Cover image for Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus

Building Trinity Protocol v3.1: A Deep Dive into 2-of-3 Multi-Chain Consensus

1
Comments
13 min read
A Developer's Guide to Useful Apache Modules

A Developer's Guide to Useful Apache Modules

5
Comments
3 min read
📰 Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools
Cover image for 📰 Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools

📰 Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools

10
Comments
6 min read
Mastering Role-Based Access Control in Your Javascript CMS
Cover image for Mastering Role-Based Access Control in Your Javascript CMS

Mastering Role-Based Access Control in Your Javascript CMS

Comments
6 min read
Feeling the Vibes with Verifi
Cover image for Feeling the Vibes with Verifi

Feeling the Vibes with Verifi

Comments
3 min read
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails

Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails

Comments
10 min read
Signal Private Messenger Crypto Algorithm Double to Triple

Signal Private Messenger Crypto Algorithm Double to Triple

Comments
4 min read
NPMScan - keep your NPM packages secure
Cover image for NPMScan - keep your NPM packages secure

NPMScan - keep your NPM packages secure

Comments
1 min read
Kubernetes Governance and Policy (OPA, Gatekeeper)

Kubernetes Governance and Policy (OPA, Gatekeeper)

Comments
4 min read
Building an Open Vulnerability Database for Minecraft Servers

Building an Open Vulnerability Database for Minecraft Servers

1
Comments
1 min read
The Quantum Threat Nobody's Taking Seriously (But Should)
Cover image for The Quantum Threat Nobody's Taking Seriously (But Should)

The Quantum Threat Nobody's Taking Seriously (But Should)

Comments
3 min read
Securing Private AWS Environments with a Bastion Host — The DevOps Gateway Explained

Securing Private AWS Environments with a Bastion Host — The DevOps Gateway Explained

Comments
3 min read
🧵 Understanding L1s, L2s, and Rollups

🧵 Understanding L1s, L2s, and Rollups

Comments
2 min read
6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms
Cover image for 6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

Comments
8 min read
Securely storing passwords in a database
Cover image for Securely storing passwords in a database

Securely storing passwords in a database

5
Comments
3 min read
How to Install DVWS (Damn Vulnerable Web Services) on Nginx

How to Install DVWS (Damn Vulnerable Web Services) on Nginx

1
Comments
5 min read
Directory Traversal Attacks

Directory Traversal Attacks

Comments
5 min read
How to send OTP codes with SMS in Node.js
Cover image for How to send OTP codes with SMS in Node.js

How to send OTP codes with SMS in Node.js

1
Comments
2 min read
1% 0 — Sobre la improbabilidad estadística de conservar la conciencia en un sistema que la penaliza

1% 0 — Sobre la improbabilidad estadística de conservar la conciencia en un sistema que la penaliza

Comments
4 min read
The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)
Cover image for The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

Comments
2 min read
One Dockerfile, Two Stages: A 50% Size Reduction Story

One Dockerfile, Two Stages: A 50% Size Reduction Story

9
Comments
4 min read
Quantum-Powered Privacy: Securing the IoT with Decentralized Anomaly Detection

Quantum-Powered Privacy: Securing the IoT with Decentralized Anomaly Detection

Comments
2 min read
Revamping the Organization Dashboard for OWASP BLT: My GSoC 2025 Journey
Cover image for Revamping the Organization Dashboard for OWASP BLT: My GSoC 2025 Journey

Revamping the Organization Dashboard for OWASP BLT: My GSoC 2025 Journey

2
Comments
4 min read
Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It
Cover image for Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Comments
3 min read
Security news weekly round-up - 31st October 2025
Cover image for Security news weekly round-up - 31st October 2025

Security news weekly round-up - 31st October 2025

Comments
2 min read
loading...