Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Agentic AI Security: Why Autonomous Systems Require a New Security Framework
Cover image for Agentic AI Security: Why Autonomous Systems Require a New Security Framework

Agentic AI Security: Why Autonomous Systems Require a New Security Framework

38
Comments 12
5 min read
File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes
Cover image for File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

Comments
7 min read
Kubernetes validating admission policy and admission binding
Cover image for Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
FeetFinder & Background Checks: How Deep Do Employment Checks Go?

FeetFinder & Background Checks: How Deep Do Employment Checks Go?

Comments
4 min read
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations
Cover image for Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

8
Comments 2
5 min read
Catch vulnerabilities before they ship: local SonarQube setup (Part 2)
Cover image for Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

1
Comments
8 min read
Building a Production-Ready A2A Protocol Agent: A Technical Journey

Building a Production-Ready A2A Protocol Agent: A Technical Journey

1
Comments
4 min read
Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks
Cover image for Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

2
Comments
6 min read
Keeping Your Health Data Out of Court
Cover image for Keeping Your Health Data Out of Court

Keeping Your Health Data Out of Court

Comments
5 min read
😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫
Cover image for 😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

12
Comments 2
3 min read
How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

Comments
5 min read
Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Comments
4 min read
Day 8 — Threat Validation (The Girl in the Red Cloak)
Cover image for Day 8 — Threat Validation (The Girl in the Red Cloak)

Day 8 — Threat Validation (The Girl in the Red Cloak)

4
Comments
2 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

15
Comments 2
4 min read
YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security
Cover image for YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

1
Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.