Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included
Cover image for I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included

I automated an AWS Security Maturity Model recommendation across 40 accounts — design decisions included

Comments
10 min read
AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.
Cover image for AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.

AIUC-1 Has 51 Requirements. Here's Which Ones You Can Actually Automate.

Comments
7 min read
RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models
Cover image for RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models

RBAC vs ABAC vs ReBAC: How to Choose and Implement Access Control Models

2
Comments 2
15 min read
How We Ensured API Keys Never Linger in RAM

How We Ensured API Keys Never Linger in RAM

2
Comments
3 min read
When a Simple Security Audit Turns Into a 3-Hour Python Environment Battle (And How We Won)

When a Simple Security Audit Turns Into a 3-Hour Python Environment Battle (And How We Won)

Comments
3 min read
We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

We Detonated the Real LiteLLM Malware on EC2: Here’s What Happened

Comments
10 min read
Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

1
Comments
3 min read
The Resolv Labs USR Exploit: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

The Resolv Labs USR Exploit: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

1
Comments
4 min read
Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Age-Verification Integration in Internet Infrastructure Raises Technical, Legal, and Privacy Concerns

Comments
14 min read
Secure by Design: Managing Docker Swarm Secrets the SwarmCLI Way

Secure by Design: Managing Docker Swarm Secrets the SwarmCLI Way

Comments
3 min read
Waygate MCP v2.1.0: From Forensic Analysis to Production Enterprise Server with TaskWarrior

Waygate MCP v2.1.0: From Forensic Analysis to Production Enterprise Server with TaskWarrior

Comments
8 min read
Building Moat: Auth, On-Chain Receipts, and 117 Integration Tests in One Week

Building Moat: Auth, On-Chain Receipts, and 117 Integration Tests in One Week

Comments
5 min read
āļŠāļĢāđ‰āļēāļ‡ API āļ—āļĩāđˆ HIPAA Compliance āđƒāļ™āļ›āļĩ 2026 āļŠāļģāļŦāļĢāļąāļšāđāļ­āļ›āļžāļĨāļīāđ€āļ„āļŠāļąāļ™āļ”āđ‰āļēāļ™āļāļēāļĢāļ”āļđāđāļĨāļŠāļļāļ‚āļ āļēāļžāļ—āļĩāđˆāļ›āļĨāļ­āļ”āļ āļąāļĒ
Cover image for āļŠāļĢāđ‰āļēāļ‡ API āļ—āļĩāđˆ HIPAA Compliance āđƒāļ™āļ›āļĩ 2026 āļŠāļģāļŦāļĢāļąāļšāđāļ­āļ›āļžāļĨāļīāđ€āļ„āļŠāļąāļ™āļ”āđ‰āļēāļ™āļāļēāļĢāļ”āļđāđāļĨāļŠāļļāļ‚āļ āļēāļžāļ—āļĩāđˆāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļŠāļĢāđ‰āļēāļ‡ API āļ—āļĩāđˆ HIPAA Compliance āđƒāļ™āļ›āļĩ 2026 āļŠāļģāļŦāļĢāļąāļšāđāļ­āļ›āļžāļĨāļīāđ€āļ„āļŠāļąāļ™āļ”āđ‰āļēāļ™āļāļēāļĢāļ”āļđāđāļĨāļŠāļļāļ‚āļ āļēāļžāļ—āļĩāđˆāļ›āļĨāļ­āļ”āļ āļąāļĒ

Comments
7 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
They Compromised the Security Scanners First. Then They Came for Your AI Tools.

They Compromised the Security Scanners First. Then They Came for Your AI Tools.

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.