Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Built a Real-Time DDoS Detection Engine from Scratch

How I Built a Real-Time DDoS Detection Engine from Scratch

Comments
4 min read
Delve Fabricated SOC2 for 494 Companies. EU AI Act Article 12 Won't Work the Same Way.

Delve Fabricated SOC2 for 494 Companies. EU AI Act Article 12 Won't Work the Same Way.

Comments
2 min read
Building a Self-Learning DDoS Guard
Cover image for Building a Self-Learning DDoS Guard

Building a Self-Learning DDoS Guard

Comments
2 min read
[x509Lab]Generating & Parsing CSRs in the Browser (No OpenSSL required) - x509Lab v1.4.0

[x509Lab]Generating & Parsing CSRs in the Browser (No OpenSSL required) - x509Lab v1.4.0

Comments
2 min read
OAuth 2.0 + PKCE: Why OAuth Alone is Not Enough to Secure Your API

OAuth 2.0 + PKCE: Why OAuth Alone is Not Enough to Secure Your API

1
Comments
1 min read
Managing Claude Code Bash permissions with YAML and tests

Managing Claude Code Bash permissions with YAML and tests

1
Comments
7 min read
How I Built an Adaptive "Immune System" for Cloud Traffic
Cover image for How I Built an Adaptive "Immune System" for Cloud Traffic

How I Built an Adaptive "Immune System" for Cloud Traffic

Comments
3 min read
How I Built a Real-Time DDoS Detection Engine from Scratch (No Fail2Ban)
Cover image for How I Built a Real-Time DDoS Detection Engine from Scratch (No Fail2Ban)

How I Built a Real-Time DDoS Detection Engine from Scratch (No Fail2Ban)

Comments
4 min read
AWS CDK + Clef: Shift secrets policy and governance left
Cover image for AWS CDK + Clef: Shift secrets policy and governance left

AWS CDK + Clef: Shift secrets policy and governance left

1
Comments 1
8 min read
CVE-2026-41940, Supply Chain Defense & Linux Root Exploit

CVE-2026-41940, Supply Chain Defense & Linux Root Exploit

Comments
3 min read
Post volume is the worst spam signal (here is the data)

Post volume is the worst spam signal (here is the data)

Comments
5 min read
Adding Authentication Middleware With Descope
Cover image for Adding Authentication Middleware With Descope

Adding Authentication Middleware With Descope

6
Comments
5 min read
SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier
Cover image for SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier

SLSA Provenance Hands-on: Generate with GitHub Actions, Verify with slsa-verifier

Comments
11 min read
I built istempmail.com

I built istempmail.com

Comments
1 min read
Per-agent hash chain, with a verifier that re-derives
Cover image for Per-agent hash chain, with a verifier that re-derives

Per-agent hash chain, with a verifier that re-derives

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.