Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.
Cover image for I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.

I Analyzed My Browser Cookies - 1,572 Trackers Found. Here's What They Know About Me.

Comments
6 min read
Decoding Urban Chaos: AI's Edge in Real-Time Traffic Anomaly Detection

Decoding Urban Chaos: AI's Edge in Real-Time Traffic Anomaly Detection

Comments
2 min read
Audio's New Frontier: Balancing Creation and Copyright in the AI Age by Arvind Sundararajan

Audio's New Frontier: Balancing Creation and Copyright in the AI Age by Arvind Sundararajan

Comments
2 min read
Getting Started with eslint-plugin-secure-coding
Cover image for Getting Started with eslint-plugin-secure-coding

Getting Started with eslint-plugin-secure-coding

Comments
3 min read
The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

The Passkey Revolution: Why 2025 Is the Year Passwords Finally Die

1
Comments
2 min read
What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

What Is SIEM? Understanding Its Role in the Modern Cybersecurity Ecosystem

Comments
3 min read
ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware
Cover image for ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

ClickFix: A Rising Social Engineering Method Being Used to Deliver Malware

Comments
5 min read
Hardware-backed SSH authentication with YubiKey (FIDO2)
Cover image for Hardware-backed SSH authentication with YubiKey (FIDO2)

Hardware-backed SSH authentication with YubiKey (FIDO2)

Comments 3
3 min read
The Art Of System Awareness: Reading Signals With Code

The Art Of System Awareness: Reading Signals With Code

Comments
8 min read
Excessive Agency in Agentic AI: Setting Safe Boundaries
Cover image for Excessive Agency in Agentic AI: Setting Safe Boundaries

Excessive Agency in Agentic AI: Setting Safe Boundaries

Comments
9 min read
Security news weekly round-up - 28th November 2025
Cover image for Security news weekly round-up - 28th November 2025

Security news weekly round-up - 28th November 2025

1
Comments
3 min read
Shadow Routes: Threading Yourself Through The Cracks In A City
Cover image for Shadow Routes: Threading Yourself Through The Cracks In A City

Shadow Routes: Threading Yourself Through The Cracks In A City

Comments
7 min read
How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

How to Evaluate Smart Device + Token Projects: A Checklist for Crypto Investors & Builders

Comments
2 min read
70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.
Cover image for 70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

70% of Vulnerabilities Are Memory Bugs. Here's How We Instrumented Everything.

Comments
1 min read
Limiting Public Access and Protecting Sensitive Data in Azure Storage
Cover image for Limiting Public Access and Protecting Sensitive Data in Azure Storage

Limiting Public Access and Protecting Sensitive Data in Azure Storage

Comments
3 min read
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Environment Variables Without the Chaos: A Vault-First Approach
Cover image for Environment Variables Without the Chaos: A Vault-First Approach

Environment Variables Without the Chaos: A Vault-First Approach

Comments
13 min read
Beyond Filters: Rearchitecting Prompt Injection Defense
Cover image for Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

2
Comments
4 min read
The Security Engineer Interview Cheat Sheet for JavaScript Developers
Cover image for The Security Engineer Interview Cheat Sheet for JavaScript Developers

The Security Engineer Interview Cheat Sheet for JavaScript Developers

Comments
3 min read
3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)
Cover image for 3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

Comments
2 min read
Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix
Cover image for Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix

Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix

Comments
2 min read
48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production
Cover image for 48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

Comments
1 min read
Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Comments
2 min read
Using IAM Users in 2026 Is a Life Choice
Cover image for Using IAM Users in 2026 Is a Life Choice

Using IAM Users in 2026 Is a Life Choice

3
Comments 3
3 min read
loading...