Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Hardware Security for Trading Bots: D'CENT Integration with Human-in-the-Loop Approval
Cover image for Hardware Security for Trading Bots: D'CENT Integration with Human-in-the-Loop Approval

Hardware Security for Trading Bots: D'CENT Integration with Human-in-the-Loop Approval

Comments
5 min read
AI Agent Disaster Postmortems: The 3 Structural Guardrails

AI Agent Disaster Postmortems: The 3 Structural Guardrails

Comments
12 min read
MCP tool descriptions are part of your security model

MCP tool descriptions are part of your security model

Comments
2 min read
The "Jupyter Trap": Why Giving Agents a Python Kernel is Just Automated RCE
Cover image for The "Jupyter Trap": Why Giving Agents a Python Kernel is Just Automated RCE

The "Jupyter Trap": Why Giving Agents a Python Kernel is Just Automated RCE

1
Comments
3 min read
AI Is Breaking Two Vulnerability Cultures — And Vibe Coders Are About to Get Caught in the Middle

AI Is Breaking Two Vulnerability Cultures — And Vibe Coders Are About to Get Caught in the Middle

2
Comments 1
5 min read
IP Geolocation for Fraud Detection — A Developer's Guide

IP Geolocation for Fraud Detection — A Developer's Guide

Comments
2 min read
Governance and Liability in AI Agents: What I Built Trying to Answer Those Questions
Cover image for Governance and Liability in AI Agents: What I Built Trying to Answer Those Questions

Governance and Liability in AI Agents: What I Built Trying to Answer Those Questions

Comments
4 min read
Data Science Techniques That Speed Up Incident Response

Data Science Techniques That Speed Up Incident Response

Comments
4 min read
161 verified AI package hallucinations across 8.5M indexed — open dataset

161 verified AI package hallucinations across 8.5M indexed — open dataset

Comments
4 min read
ATLSECCON 2026: Context, Identity, and Restraint in Modern Security
Cover image for ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

ATLSECCON 2026: Context, Identity, and Restraint in Modern Security

Comments
8 min read
How VLESS Reality Made VPNs Unblockable by Pretending to Be Google
Cover image for How VLESS Reality Made VPNs Unblockable by Pretending to Be Google

How VLESS Reality Made VPNs Unblockable by Pretending to Be Google

Comments
5 min read
How to Create Safe External Redirects in WordPress
Cover image for How to Create Safe External Redirects in WordPress

How to Create Safe External Redirects in WordPress

Comments
4 min read
Best Secure Integration Platforms for Enterprise AI Agents: AI Agent Orchestration, Enterprise Security, IAM, and Platform Comparison

Best Secure Integration Platforms for Enterprise AI Agents: AI Agent Orchestration, Enterprise Security, IAM, and Platform Comparison

Comments
9 min read
U.S. Cyber Trust Mark: what IoT firmware teams should prepare
Cover image for U.S. Cyber Trust Mark: what IoT firmware teams should prepare

U.S. Cyber Trust Mark: what IoT firmware teams should prepare

2
Comments
2 min read
Can You Prove What Your AI Agent Did? Probably Not.

Can You Prove What Your AI Agent Did? Probably Not.

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.