Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Part 6: Disaster Recovery, Cost Management, and Future-Proofing
Cover image for Part 6: Disaster Recovery, Cost Management, and Future-Proofing

Part 6: Disaster Recovery, Cost Management, and Future-Proofing

10
Comments
4 min read
Rethinking Identity Infrastructure for Autonomous Systems

Rethinking Identity Infrastructure for Autonomous Systems

1
Comments
3 min read
📰 Major Tech News: Oct 14th, 2025
Cover image for 📰 Major Tech News: Oct 14th, 2025

📰 Major Tech News: Oct 14th, 2025

24
Comments 2
5 min read
How Are You Preparing for AI-Powered Cyber Threats?
Cover image for How Are You Preparing for AI-Powered Cyber Threats?

How Are You Preparing for AI-Powered Cyber Threats?

Comments
1 min read
I Scanned 9 Popular AI Coding Tools for Security Issues. Here's What Every Developer Should Know.

I Scanned 9 Popular AI Coding Tools for Security Issues. Here's What Every Developer Should Know.

8
Comments 2
15 min read
How to Deal with MCP “Tool Poisoning”

How to Deal with MCP “Tool Poisoning”

Comments
17 min read
No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience
Cover image for No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience

Comments
7 min read
How to use Testcontainers with PostgreSQL and SSL
Cover image for How to use Testcontainers with PostgreSQL and SSL

How to use Testcontainers with PostgreSQL and SSL

Comments
6 min read
Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Container and Cloud Security Mastery: How SentinelOne Singularity, Wiz, and StackHawk Revolutionise Application Protection in...

Comments
8 min read
Cloud Pen Testing Strategies (Azure, AWS)

Cloud Pen Testing Strategies (Azure, AWS)

Comments
5 min read
Automatic deployment via SSH

Automatic deployment via SSH

Comments
2 min read
Secrets Management: Keeping API Keys and Credentials Safe
Cover image for Secrets Management: Keeping API Keys and Credentials Safe

Secrets Management: Keeping API Keys and Credentials Safe

4
Comments
2 min read
How RSA Works (for Dummies)

How RSA Works (for Dummies)

Comments 2
4 min read
Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Poisoned Prompts: How Malicious Documentation Can Hijack Your AI Code

Comments
2 min read
I spent a week building OAuth Plumbing that shouldn't exist

I spent a week building OAuth Plumbing that shouldn't exist

1
Comments
4 min read
Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

Unlock LLM Potential at the Edge: Secure, Efficient Inference Without the Cloud

5
Comments
2 min read
AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

AI SAST vs AI DAST: Friends or Foes? Building a Comprehensive Testing Strategy

6
Comments
3 min read
GitHub Actions: Why You Should Pin Your Actions to a Specific Version

GitHub Actions: Why You Should Pin Your Actions to a Specific Version

4
Comments 1
4 min read
Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

Teaching Security Scanners to Remember - Using Vector Embeddings to Stop Chasing Ghost Ports

1
Comments
4 min read
How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !
Cover image for How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

How the live Kubernetes DNS Tunneling Demo Was Scripted ? live at CDS 2025 Conference !

2
Comments
4 min read
Selecting the appropriate Docker base image
Cover image for Selecting the appropriate Docker base image

Selecting the appropriate Docker base image

8
Comments
4 min read
Best Secret Scanning Tools for 2025: What Every Developer Needs to Know
Cover image for Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

Best Secret Scanning Tools for 2025: What Every Developer Needs to Know

6
Comments
3 min read
🚫Never Use finalize() in Java

🚫Never Use finalize() in Java

3
Comments
3 min read
The Silent Thief in Your Code: When AI Assistants Get Hacked

The Silent Thief in Your Code: When AI Assistants Get Hacked

Comments
2 min read
Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso
Cover image for Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Modelos de Lenguaje Grandes (LLMs) y su Potencial Malicioso

Comments
9 min read
loading...