Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Prompt Injection: What Security Managers Need to Know

Prompt Injection: What Security Managers Need to Know

Comments
15 min read
Software Fun-duh-mentals - DNS
Cover image for Software Fun-duh-mentals - DNS

Software Fun-duh-mentals - DNS

Comments
3 min read
secrets in Terraform. How it handles. project.

secrets in Terraform. How it handles. project.

3
Comments
3 min read
Why the MITRE ATT&CK Framework Actually Works

Why the MITRE ATT&CK Framework Actually Works

Comments
6 min read
Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

Introducing SSH Secure Audit: A Lightweight Open-Source SSH Security Scanner for Linux

1
Comments
1 min read
AuthController

AuthController

Comments
2 min read
How I Used TPM for Key Encryption in Rust on Linux (Hardware TPM & vTPM)
Cover image for How I Used TPM for Key Encryption in Rust on Linux (Hardware TPM & vTPM)

How I Used TPM for Key Encryption in Rust on Linux (Hardware TPM & vTPM)

1
Comments 2
30 min read
TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

TUTORIAL: Implementasi Email Aman & Anti-Blokir (Zero Bounce Policy)

Comments
4 min read
NIRAPAD Alliance Just Launched: A Major National Effort for Mental Health & Cyber Safety 🇧🇩
Cover image for NIRAPAD Alliance Just Launched: A Major National Effort for Mental Health & Cyber Safety 🇧🇩

NIRAPAD Alliance Just Launched: A Major National Effort for Mental Health & Cyber Safety 🇧🇩

10
Comments 2
2 min read
Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB
Cover image for Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

Build a Multi-Tenant RAG with Fine-Grain Authorization using Motia and SpiceDB

1
Comments
20 min read
Erase & Protect: Face Anonymization Without the AI Training Hassle by Arvind Sundararajan

Erase & Protect: Face Anonymization Without the AI Training Hassle by Arvind Sundararajan

1
Comments
2 min read
Stop Overpaying for AWS WAF! (5 Cost Optimization Tips)

Stop Overpaying for AWS WAF! (5 Cost Optimization Tips)

Comments
2 min read
Secure Agent Database Access: Architecture Patterns That Actually Work
Cover image for Secure Agent Database Access: Architecture Patterns That Actually Work

Secure Agent Database Access: Architecture Patterns That Actually Work

Comments
15 min read
Securing Serverless APIs with Amazon Cognito and API Gateway JWT Authorizers
Cover image for Securing Serverless APIs with Amazon Cognito and API Gateway JWT Authorizers

Securing Serverless APIs with Amazon Cognito and API Gateway JWT Authorizers

Comments
5 min read
How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws
Cover image for How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

How a $5 Domain Purchase Exposed Critical AI Agent Security Flaws

Comments
14 min read
🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

🚀 ElasticSecOpsCoPilot — Autonomous IOC Enrichment for Elastic Security

Comments
1 min read
How to Generate Secure JWT Secrets: A Complete Guide for Developers

How to Generate Secure JWT Secrets: A Complete Guide for Developers

1
Comments
4 min read
How to integrate Brakeman Security Scanner with GitHub Code Scanning

How to integrate Brakeman Security Scanner with GitHub Code Scanning

2
Comments
5 min read
How 129KB of Whitespace (and a Recursive Loop) Broke the Web
Cover image for How 129KB of Whitespace (and a Recursive Loop) Broke the Web

How 129KB of Whitespace (and a Recursive Loop) Broke the Web

1
Comments
5 min read
I don't trust password managers. So I built one.
Cover image for I don't trust password managers. So I built one.

I don't trust password managers. So I built one.

2
Comments
3 min read
❄️A Five-Minute UI Feature That Became an XSS Time Bomb
Cover image for ❄️A Five-Minute UI Feature That Became an XSS Time Bomb

❄️A Five-Minute UI Feature That Became an XSS Time Bomb

59
Comments 20
4 min read
Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)
Cover image for Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Ping Federate: Complete Guide to Identity Federation, SSO, and Modern Authentication (2025)

Comments
5 min read
🚀 Modern Security Guide for Java Developers

🚀 Modern Security Guide for Java Developers

4
Comments
3 min read
ATM Hacking: From Terminator 2 Fantasy to Red Team Reality
Cover image for ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

ATM Hacking: From Terminator 2 Fantasy to Red Team Reality

Comments
12 min read
Moving My Technical Essays to Medium

Moving My Technical Essays to Medium

Comments 2
1 min read
loading...