Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Reducing False Positives in WAF: Combining OWASP Rules with AI Context
Cover image for Reducing False Positives in WAF: Combining OWASP Rules with AI Context

Reducing False Positives in WAF: Combining OWASP Rules with AI Context

1
Comments
3 min read
Your AI Assistant Can See Your Secrets — Here's How I Fixed It

Your AI Assistant Can See Your Secrets — Here's How I Fixed It

Comments
8 min read
Your API Is Public by Default — Let’s Fix That
Cover image for Your API Is Public by Default — Let’s Fix That

Your API Is Public by Default — Let’s Fix That

2
Comments 2
3 min read
Starting My Dev.to Journey as a DevSecOps Engineer

Starting My Dev.to Journey as a DevSecOps Engineer

1
Comments
1 min read
Vibe Coding and 1.5M API Leaks: The Moltbook Post-Mortem
Cover image for Vibe Coding and 1.5M API Leaks: The Moltbook Post-Mortem

Vibe Coding and 1.5M API Leaks: The Moltbook Post-Mortem

5
Comments 5
4 min read
InfraForge v1.0.0 Launch

InfraForge v1.0.0 Launch

Comments
2 min read
CSRF in the Modern Era: Do you actually need tokens in a decoupled React/Node app?

CSRF in the Modern Era: Do you actually need tokens in a decoupled React/Node app?

Comments
3 min read
đź”’ Building a Secure AWS Environment with Terraform + AWS CloudShell

đź”’ Building a Secure AWS Environment with Terraform + AWS CloudShell

1
Comments
6 min read
Wearable Data Security: Protect User Privacy by Building a Secure Health Data Pipeline

Wearable Data Security: Protect User Privacy by Building a Secure Health Data Pipeline

Comments
2 min read
🛡️ Building a Cloud Security Dashboard with AWS Athena + QuickSight (Beginner Friendly)

🛡️ Building a Cloud Security Dashboard with AWS Athena + QuickSight (Beginner Friendly)

Comments
8 min read
Introducing nono: A Secure Sandbox for AI Agents
Cover image for Introducing nono: A Secure Sandbox for AI Agents

Introducing nono: A Secure Sandbox for AI Agents

4
Comments
4 min read
SSL/TLS Security and Certificate Management

SSL/TLS Security and Certificate Management

Comments
3 min read
The Silent Leak: Why Sensitive Data Masking is Your Most Critical Log Strategy

The Silent Leak: Why Sensitive Data Masking is Your Most Critical Log Strategy

Comments
3 min read
The Virtual Private Clouds (VPCs) is No Longer a Castle. It’s an Immune System.
Cover image for The Virtual Private Clouds (VPCs) is No Longer a Castle. It’s an Immune System.

The Virtual Private Clouds (VPCs) is No Longer a Castle. It’s an Immune System.

5
Comments
4 min read
The Architecture of Risk: Why Agent Substrates Are Manipulation Engines
Cover image for The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

2
Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.