Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Many AI Tokens to Play a Game of Chess?
Cover image for How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)
Cover image for She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

8
Comments
2 min read
Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data
Cover image for Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

4
Comments
5 min read
🚨 Monitoring in 2025: 6 Rules That Saved My Projects

🚨 Monitoring in 2025: 6 Rules That Saved My Projects

Comments
1 min read
Top 6 BoldSign Features That Make E-Signatures Effortless
Cover image for Top 6 BoldSign Features That Make E-Signatures Effortless

Top 6 BoldSign Features That Make E-Signatures Effortless

3
Comments
4 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
8 important security changes from Android 8 to Android 15
Cover image for 8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

Comments
3 min read
Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025
Cover image for Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

1
Comments
5 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
JWT Authentication Deep Dive: Creation, Storage, and Verification
Cover image for JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

1
Comments
4 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control
Cover image for Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover
Cover image for IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025
Cover image for 15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.