Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Modernizing Telecom Security ML Powered Approach

Modernizing Telecom Security ML Powered Approach

Comments
5 min read
Limiting Public Access and Protecting Sensitive Data in Azure Storage
Cover image for Limiting Public Access and Protecting Sensitive Data in Azure Storage

Limiting Public Access and Protecting Sensitive Data in Azure Storage

Comments
3 min read
Environment Variables Without the Chaos: A Vault-First Approach
Cover image for Environment Variables Without the Chaos: A Vault-First Approach

Environment Variables Without the Chaos: A Vault-First Approach

Comments
13 min read
Beyond Filters: Rearchitecting Prompt Injection Defense
Cover image for Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

How I Built a Secure CI/CD Pipeline Using Kaniko, Jenkins, and Kubernetes

2
Comments
4 min read
The Security Engineer Interview Cheat Sheet for JavaScript Developers
Cover image for The Security Engineer Interview Cheat Sheet for JavaScript Developers

The Security Engineer Interview Cheat Sheet for JavaScript Developers

Comments
3 min read
3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)
Cover image for 3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

3 Lines of Code to Hack Your Vercel AI App (And 1 Line to Fix It)

Comments
2 min read
Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix
Cover image for Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix

Hardcoded Secrets: The #1 Vulnerability AI Agents Can Auto-Fix

Comments
2 min read
48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production
Cover image for 48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

48-Hour Contractor Onboarding at Scale – The Exact SailPoint + Okta Workflow We Run in Production

Comments
1 min read
Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Fortifying Web Security with Rate Limiting: A Shield Against Cyber Threats

Comments
2 min read
Using IAM Users in 2026 Is a Life Choice
Cover image for Using IAM Users in 2026 Is a Life Choice

Using IAM Users in 2026 Is a Life Choice

3
Comments 3
3 min read
Build Your Own AIDE Automation - Guide

Build Your Own AIDE Automation - Guide

1
Comments
3 min read
Prompt Injection Attacks: The Hidden Security Threat in AI Applications
Cover image for Prompt Injection Attacks: The Hidden Security Threat in AI Applications

Prompt Injection Attacks: The Hidden Security Threat in AI Applications

1
Comments
14 min read
AWS Security Fundamentals with AWS BuilderCards Security Expansion Pack

AWS Security Fundamentals with AWS BuilderCards Security Expansion Pack

Comments
10 min read
Encrypting Secrets in Production (Without Breaking Everything)

Encrypting Secrets in Production (Without Breaking Everything)

Comments
4 min read
Getting Started with eslint-plugin-vercel-ai-security

Getting Started with eslint-plugin-vercel-ai-security

Comments
2 min read
Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Comments
15 min read
Redact PII Before Sending Data to LLMs: A Developer's Guide
Cover image for Redact PII Before Sending Data to LLMs: A Developer's Guide

Redact PII Before Sending Data to LLMs: A Developer's Guide

72
Comments 12
3 min read
From MVP to Scale: Automated Security Testing for Every Startup Stage
Cover image for From MVP to Scale: Automated Security Testing for Every Startup Stage

From MVP to Scale: Automated Security Testing for Every Startup Stage

Comments
4 min read
Mapping Your Codebase to OWASP Top 10 with 247 ESLint Rules
Cover image for Mapping Your Codebase to OWASP Top 10 with 247 ESLint Rules

Mapping Your Codebase to OWASP Top 10 with 247 ESLint Rules

Comments
5 min read
Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)
Cover image for Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)

Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)

2
Comments 5
6 min read
How to implement GHASH

How to implement GHASH

Comments
9 min read
WIP student project: multi-account AWS “Secure Data Hub” (would love feedback!)

WIP student project: multi-account AWS “Secure Data Hub” (would love feedback!)

1
Comments
1 min read
Deploying TEAM and Building the Best Engineering Team

Deploying TEAM and Building the Best Engineering Team

Comments
3 min read
Secrets Management in Production

Secrets Management in Production

Comments
6 min read
loading...