Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan

Silent Signals: Hiding Red Team Operations in AI Noise by Arvind Sundararajan

Comments 1
2 min read
A importância de gerenciar corretamente variáveis de ambiente (.env)

A importância de gerenciar corretamente variáveis de ambiente (.env)

Comments
3 min read
Application Security with AI SAST: How AI SAST is making the Future Proactive

Application Security with AI SAST: How AI SAST is making the Future Proactive

5
Comments
3 min read
The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation
Cover image for The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation

The Architecture of Browser Sandboxes: A Deep Dive into JavaScript Code Isolation

6
Comments 2
51 min read
SREday SF 2025: Human Centered SRE In An AI World
Cover image for SREday SF 2025: Human Centered SRE In An AI World

SREday SF 2025: Human Centered SRE In An AI World

Comments
7 min read
Authentication vs Authorization (Explained in the Simplest Way Possible)

Authentication vs Authorization (Explained in the Simplest Way Possible)

4
Comments 2
2 min read
Building Real Privacy: Secure Data Transmission Without Servers

Building Real Privacy: Secure Data Transmission Without Servers

Comments
2 min read
Análise de Vetores de Ataque em Arquitetura de Aplicações Web
Cover image for Análise de Vetores de Ataque em Arquitetura de Aplicações Web

Análise de Vetores de Ataque em Arquitetura de Aplicações Web

1
Comments
17 min read
OSI Layer 4 Security Vulnerabilities & Resolutions
Cover image for OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

3
Comments 2
4 min read
AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

4
Comments
2 min read
requestPermissionsFromUser() does not work or directly returns without asking the user.

requestPermissionsFromUser() does not work or directly returns without asking the user.

1
Comments
1 min read
5 Security Vulnerabilities Every Developer Must Fix Today
Cover image for 5 Security Vulnerabilities Every Developer Must Fix Today

5 Security Vulnerabilities Every Developer Must Fix Today

Comments
3 min read
đź”’ Protect Sensitive Data in Uniface 10.4 with Pathscrambler

đź”’ Protect Sensitive Data in Uniface 10.4 with Pathscrambler

Comments
2 min read
From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM
Cover image for From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

1
Comments 2
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.