Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Essential Security Practices for Securing Your Node.js Application

Essential Security Practices for Securing Your Node.js Application

1
Comments
1 min read
React2Shell in the Wild: Tracking and Disrupting Scanner Pipelines

React2Shell in the Wild: Tracking and Disrupting Scanner Pipelines

Comments
10 min read
Security Challenges & Best Practices for Industrial Edge Analytics
Cover image for Security Challenges & Best Practices for Industrial Edge Analytics

Security Challenges & Best Practices for Industrial Edge Analytics

Comments
7 min read
AI Systems That Can’t Say “No” Are Not Production-Ready

AI Systems That Can’t Say “No” Are Not Production-Ready

Comments
2 min read
Binary Sovereignty: Stop Uploading Your Unreleased App to Strangers
Cover image for Binary Sovereignty: Stop Uploading Your Unreleased App to Strangers

Binary Sovereignty: Stop Uploading Your Unreleased App to Strangers

Comments
6 min read
Executability Is the Real Safety Boundary
Cover image for Executability Is the Real Safety Boundary

Executability Is the Real Safety Boundary

Comments
2 min read
DevRealityOps Manifesto
Cover image for DevRealityOps Manifesto

DevRealityOps Manifesto

Comments
2 min read
Zero‑Friction Secret Management
Cover image for Zero‑Friction Secret Management

Zero‑Friction Secret Management

5
Comments
5 min read
Azure - Managed Identities - Complete Tutorial

Azure - Managed Identities - Complete Tutorial

Comments
2 min read
Trademarks Are a Security Problem, Not Just a Legal One

Trademarks Are a Security Problem, Not Just a Legal One

Comments
3 min read
LLM Prompt Injection Attacks: The Complete Security Guide for Developers Building AI Applications

LLM Prompt Injection Attacks: The Complete Security Guide for Developers Building AI Applications

2
Comments 1
20 min read
Two VS Code AI Extensions Just Got Caught Stealing Code from 1.5 Million Developers

Two VS Code AI Extensions Just Got Caught Stealing Code from 1.5 Million Developers

2
Comments
3 min read
Building a Secure Bastion Host Architecture in AWS: A Complete Step-by-Step Guide

Building a Secure Bastion Host Architecture in AWS: A Complete Step-by-Step Guide

Comments
11 min read
Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Stop Hashing Passwords: A Practical Step-by-Step Passkey Tutorial

Comments
10 min read
Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk
Cover image for Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

1
Comments 2
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.