Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I Built secret2.link to Share Secrets Once

I Built secret2.link to Share Secrets Once

Comments
1 min read
The Kill Switch: Emergency Controls for Autonomous Fleets

The Kill Switch: Emergency Controls for Autonomous Fleets

Comments
4 min read
No todo el riesgo en la IA proviene de intenciones maliciosas

No todo el riesgo en la IA proviene de intenciones maliciosas

Comments
1 min read
AWS Security Services: A Conversation Between Engineers
Cover image for AWS Security Services: A Conversation Between Engineers

AWS Security Services: A Conversation Between Engineers

Comments
24 min read
🚀 Supercarga la Autenticación en NestJS con Firebase
Cover image for 🚀 Supercarga la Autenticación en NestJS con Firebase

🚀 Supercarga la Autenticación en NestJS con Firebase

Comments
3 min read
I built a resume builder that can't read your resume
Cover image for I built a resume builder that can't read your resume

I built a resume builder that can't read your resume

Comments
1 min read
Del concepto a la estructura: continuando el trabajo sobre gobernanza de la IA

Del concepto a la estructura: continuando el trabajo sobre gobernanza de la IA

Comments
1 min read
Why and How to Remove Unused WordPress Plugins Safely
Cover image for Why and How to Remove Unused WordPress Plugins Safely

Why and How to Remove Unused WordPress Plugins Safely

Comments
3 min read
Unitary Patent in Advisory Practice Strategic reality between numbers, client expectations, and law firm organization
Cover image for Unitary Patent in Advisory Practice Strategic reality between numbers, client expectations, and law firm organization

Unitary Patent in Advisory Practice Strategic reality between numbers, client expectations, and law firm organization

5
Comments
4 min read
Trouble with Test After Introducing django-axes

Trouble with Test After Introducing django-axes

Comments
2 min read
Inside Linux TCP: From Handshake to Reset or Close

Inside Linux TCP: From Handshake to Reset or Close

Comments
1 min read
ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

ERC-20 Approval Attacks: Why AI Agents Are the Perfect Target

Comments
4 min read
From Concept to Structure: Continuing the Work on AI Governance

From Concept to Structure: Continuing the Work on AI Governance

Comments
1 min read
Custodial vs Non-Custodial: The Key Architecture Decision for AI Agent Wallets

Custodial vs Non-Custodial: The Key Architecture Decision for AI Agent Wallets

Comments
5 min read
Exploring DID-based authentication for A2A Protocol agents 🔐
Cover image for Exploring DID-based authentication for A2A Protocol agents 🔐

Exploring DID-based authentication for A2A Protocol agents 🔐

Comments
6 min read
JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines
Cover image for JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines

JIT-Picking: Exploiting the Logic Gap in Modern JavaScript Engines

Comments
3 min read
Top 10 AWS Security Mistakes Beginners Must Avoid
Cover image for Top 10 AWS Security Mistakes Beginners Must Avoid

Top 10 AWS Security Mistakes Beginners Must Avoid

Comments
6 min read
Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Most APIs still handle oversized payloads incorrectly (and it’s a DoS problem)

Comments
1 min read
Cuando las decisiones de la IA se alejan de la responsabilidad humana, la gobernanza falla

Cuando las decisiones de la IA se alejan de la responsabilidad humana, la gobernanza falla

Comments
1 min read
When AI Decisions Drift Away From Human Accountability, Governance Fails

When AI Decisions Drift Away From Human Accountability, Governance Fails

Comments
1 min read
OAuth Simplified: A Hands-On Breakdown

OAuth Simplified: A Hands-On Breakdown

Comments
6 min read
How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide
Cover image for How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

How to Prevent Software Piracy in C# Desktop Apps: A Complete Guide

Comments
5 min read
Why I Built DDL to Data
Cover image for Why I Built DDL to Data

Why I Built DDL to Data

Comments
4 min read
Building a Secure Password Manager
Cover image for Building a Secure Password Manager

Building a Secure Password Manager

Comments
2 min read
From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey
Cover image for From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

From Deprecated npm Classic Tokens to OIDC Trusted Publishing: A CI/CD Troubleshooting Journey

Comments
5 min read
loading...