Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hashicorp Vault for secrets management

Hashicorp Vault for secrets management

1
Comments
3 min read
Fixing SQL Injection Vulnerabilities to Strengthen Security

Fixing SQL Injection Vulnerabilities to Strengthen Security

Comments 2
10 min read
Kubernetes Governance and Policy (OPA, Gatekeeper)

Kubernetes Governance and Policy (OPA, Gatekeeper)

Comments
4 min read
Building an Open Vulnerability Database for Minecraft Servers

Building an Open Vulnerability Database for Minecraft Servers

1
Comments
1 min read
The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)
Cover image for The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

The Secret Behind SAST: The Security Blind Spot Developers Can’t Ignore (Part 1)

Comments
8 min read
Federated avatars in authentik

Federated avatars in authentik

Comments 2
4 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

16
Comments 2
4 min read
Secure DevSecOps Pipelines

Secure DevSecOps Pipelines

Comments
5 min read
Security Alert: How to Check for the "Shai-Hulud" Compromise
Cover image for Security Alert: How to Check for the "Shai-Hulud" Compromise

Security Alert: How to Check for the "Shai-Hulud" Compromise

1
Comments
2 min read
One Line of Code to Secure Your AI Agents *(and Your Shadow MCP Servers)

One Line of Code to Secure Your AI Agents *(and Your Shadow MCP Servers)

Comments
6 min read
From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days
Cover image for From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

From Zero to Gemini Multi-Agint: How I built a Cognitive Firewall in 5 Days

3
Comments
4 min read
Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Empowering Security Teams: How Digital Scheduling Tools Are Revolutionizing Guard Work-Life Balance

Comments
1 min read
6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms
Cover image for 6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

6 In-Depth Comparison of RBAC in Enterprise-Grade No-Code/Low-Code Platforms

Comments
8 min read
Ransomware 2025: What’s New and How to Stay Protected

Ransomware 2025: What’s New and How to Stay Protected

5
Comments
5 min read
Verified Computing vs. Black Box AI

Verified Computing vs. Black Box AI

3
Comments 4
3 min read
How to Install DVWS (Damn Vulnerable Web Services) on Nginx

How to Install DVWS (Damn Vulnerable Web Services) on Nginx

1
Comments
5 min read
Directory Traversal Attacks

Directory Traversal Attacks

Comments
5 min read
Security news weekly round-up - 5th December 2025
Cover image for Security news weekly round-up - 5th December 2025

Security news weekly round-up - 5th December 2025

2
Comments
3 min read
Building a "Fortress" Kubernetes Cluster: Talos Linux, Proxmox, and Network Isolation

Building a "Fortress" Kubernetes Cluster: Talos Linux, Proxmox, and Network Isolation

4
Comments 1
4 min read
The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)
Cover image for The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

The Digital Inheritance Crisis: A Technical Guide to Passing Crypto Assets (2026)

Comments
2 min read
I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)
Cover image for I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)

I Built a Zero-Knowledge VPN That Can't Track You (Even If It Wanted To)

1
Comments
7 min read
Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It
Cover image for Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Understanding OWASP M1 (2024): Improper Credential Usage in React Native/Expo and How to Mitigate It

Comments
3 min read
Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles
Cover image for Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles

Secure Remote Access to AWS Environments Using VPN and Zero-Trust Principles

Comments
2 min read
Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic
Cover image for Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic

Artisan System DSL v3.0.0 – La Voluntad Sólida LLMs symbolic

Comments 1
130 min read
🗂️ Wallet-as-a-Service: Why Building Your Own Wallet Is So 2025
Cover image for 🗂️ Wallet-as-a-Service: Why Building Your Own Wallet Is So 2025

🗂️ Wallet-as-a-Service: Why Building Your Own Wallet Is So 2025

2
Comments
2 min read
loading...