Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hardening an Express API: URL Validation, Error Handling, and Tests in One Session

Hardening an Express API: URL Validation, Error Handling, and Tests in One Session

Comments
2 min read
Simplifying Python Dependency Management: Tools to Mitigate Transitive Risks and Enhance Supply-Chain Security

Simplifying Python Dependency Management: Tools to Mitigate Transitive Risks and Enhance Supply-Chain Security

Comments
7 min read
The Compliance Case for Machine Identity
Cover image for The Compliance Case for Machine Identity

The Compliance Case for Machine Identity

Comments
4 min read
How to Configure AWS Cognito for SSO: A Step-by-Step Guide

How to Configure AWS Cognito for SSO: A Step-by-Step Guide

Comments
3 min read
AI Agents Are Your Enterprise's Newest Security Blind Spot
Cover image for AI Agents Are Your Enterprise's Newest Security Blind Spot

AI Agents Are Your Enterprise's Newest Security Blind Spot

Comments
4 min read
I just hardened my OSS release pipeline to 11 layers of security — here's the playbook
Cover image for I just hardened my OSS release pipeline to 11 layers of security — here's the playbook

I just hardened my OSS release pipeline to 11 layers of security — here's the playbook

Comments
7 min read
The Illusion of Privacy

The Illusion of Privacy

Comments
5 min read
Measuring Agent Trust — Beyond Vibes

Measuring Agent Trust — Beyond Vibes

Comments
4 min read
Automated Advanced Analytics: An Unexpected Tool in the Cyber Arsenal

Automated Advanced Analytics: An Unexpected Tool in the Cyber Arsenal

Comments 1
2 min read
You can now explore npm dependency trees visually — see transitive CRITICAL risks in seconds

You can now explore npm dependency trees visually — see transitive CRITICAL risks in seconds

Comments
2 min read
Building HIPAA-Compliant Healthcare Software: Lessons from PSI Nest

Building HIPAA-Compliant Healthcare Software: Lessons from PSI Nest

Comments
2 min read
AI & Supply Chain Security: Prompt Injection Suite, Nginx CVE, & Rockstar Breach

AI & Supply Chain Security: Prompt Injection Suite, Nginx CVE, & Rockstar Breach

Comments
3 min read
When a Git Branch Name Becomes a Weapon: The Codex Command Injection That Could Steal Your GitHub Token

When a Git Branch Name Becomes a Weapon: The Codex Command Injection That Could Steal Your GitHub Token

Comments
6 min read
How we built a sanctions screening API that outperformed the Federal Reserve's benchmark
Cover image for How we built a sanctions screening API that outperformed the Federal Reserve's benchmark

How we built a sanctions screening API that outperformed the Federal Reserve's benchmark

Comments
1 min read
Why AI coding agents keep making the same mistakes (and how to stop it)

Why AI coding agents keep making the same mistakes (and how to stop it)

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.