Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Proxy IP Reputation and Why It Affects Your Success Rate

Understanding Proxy IP Reputation and Why It Affects Your Success Rate

1
Comments
2 min read
Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

Securing Biometrics: A Practical Guide to Differential Privacy for Health Data

2
Comments
4 min read
Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Google Open-Sources CEL Python Wrapper: Addressing Safe, Typed Expression Evaluation in Python

Comments
13 min read
Safer Pushes, SIEM Webhooks, and Verifiable Releases
Cover image for Safer Pushes, SIEM Webhooks, and Verifiable Releases

Safer Pushes, SIEM Webhooks, and Verifiable Releases

1
Comments
3 min read
Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Zero-Code-Change AI Security: Cerberus Now Runs as an HTTP Proxy

Comments
2 min read
Security Trimming with Microsoft 365 Copilot: Asking the Right Data in the Right Context

Security Trimming with Microsoft 365 Copilot: Asking the Right Data in the Right Context

1
Comments
10 min read
How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

How I Built an Open-Source Cybersecurity Skills Database for AI Agents (611+ Skills)

Comments
5 min read
I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works
Cover image for I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

I Built a Log Analyzer That Detects Cyberattacks — Here’s How It Works

Comments
3 min read
From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

From 80% False Positives to 95% Accurate: How We Fixed Architecture Linting

2
Comments
2 min read
We built post-quantum encrypted email that works with Gmail. Here's how.

We built post-quantum encrypted email that works with Gmail. Here's how.

1
Comments 1
2 min read
How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

How I Built Zero-Knowledge File Sharing Using the Web Crypto API (No Server Ever Sees Your Data)

Comments
3 min read
Solving the Antigravity Authentication Redirect Loop on Windows
Cover image for Solving the Antigravity Authentication Redirect Loop on Windows

Solving the Antigravity Authentication Redirect Loop on Windows

1
Comments
1 min read
Mastering Kubernetes Security: Protecting Your Cloud-Native Applications
Cover image for Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

Mastering Kubernetes Security: Protecting Your Cloud-Native Applications

1
Comments
5 min read
Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Lovable App Exposes 18,000 Users: The Vibe Coding Security Crisis Nobody Saw Coming

Comments
5 min read
Is Your Email Already Compromised? How to Check in 30 Seconds
Cover image for Is Your Email Already Compromised? How to Check in 30 Seconds

Is Your Email Already Compromised? How to Check in 30 Seconds

2
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.