Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Encrypting Secrets in Production (Without Breaking Everything)

Encrypting Secrets in Production (Without Breaking Everything)

Comments
4 min read
Hardening AI Agents: The Vercel AI Static Analysis Standard
Cover image for Hardening AI Agents: The Vercel AI Static Analysis Standard

Hardening AI Agents: The Vercel AI Static Analysis Standard

Comments
3 min read
Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Comments
15 min read
TempleOS: A Non-POSIX Operating System That Removed Protection on Purpose
Cover image for TempleOS: A Non-POSIX Operating System That Removed Protection on Purpose

TempleOS: A Non-POSIX Operating System That Removed Protection on Purpose

2
Comments
3 min read
From MVP to Scale: Automated Security Testing for Every Startup Stage
Cover image for From MVP to Scale: Automated Security Testing for Every Startup Stage

From MVP to Scale: Automated Security Testing for Every Startup Stage

Comments
4 min read
The OWASP Compliance Protocol: Mapping 247 Static Analysis Rules
Cover image for The OWASP Compliance Protocol: Mapping 247 Static Analysis Rules

The OWASP Compliance Protocol: Mapping 247 Static Analysis Rules

1
Comments
8 min read
Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)
Cover image for Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)

Critical Security Vulnerability in Next.js & React: CVE-2025-55182 (React2Shell)

2
Comments 5
6 min read
How to implement GHASH

How to implement GHASH

Comments
9 min read
Why Configuration Files Don't Belong With Your Code

Why Configuration Files Don't Belong With Your Code

Comments
11 min read
WIP student project: multi-account AWS “Secure Data Hub” (would love feedback!)

WIP student project: multi-account AWS “Secure Data Hub” (would love feedback!)

1
Comments
1 min read
Deploying TEAM and Building the Best Engineering Team

Deploying TEAM and Building the Best Engineering Team

Comments
3 min read
Secrets Management in Production

Secrets Management in Production

Comments
6 min read
Bypass WiFi Time Limits on Your Mac: One Command to Reset Your MAC Address

Bypass WiFi Time Limits on Your Mac: One Command to Reset Your MAC Address

Comments
4 min read
SAP, Microsoft, Capgemini and Sanctions: What This Deal Really Means for CIOs
Cover image for SAP, Microsoft, Capgemini and Sanctions: What This Deal Really Means for CIOs

SAP, Microsoft, Capgemini and Sanctions: What This Deal Really Means for CIOs

Comments
6 min read
AWS Shared Responsibility Model Explained
Cover image for AWS Shared Responsibility Model Explained

AWS Shared Responsibility Model Explained

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.