Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Workflow of the Future Is Already Here (And It's Nothing Like You Think)

The Workflow of the Future Is Already Here (And It's Nothing Like You Think)

2
Comments
8 min read
I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)
Cover image for I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

I Found 4 Critical Vulnerabilities Testing Llama 3.2 (And You Can Too)

1
Comments 2
5 min read
Secure SSH Shell Applications - Planning Guide

Secure SSH Shell Applications - Planning Guide

Comments
3 min read
Граница скорости: почему алгоритмы стали новым риском мировой экономики
Cover image for Граница скорости: почему алгоритмы стали новым риском мировой экономики

Граница скорости: почему алгоритмы стали новым риском мировой экономики

Comments
1 min read
Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro
Cover image for Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro

Step-By-Step Guide: Checking Your Domain’s SPF Record Like A Pro

Comments
3 min read
My Fedora Beta Disaster: Lessons from Two Years of Linux Journey

My Fedora Beta Disaster: Lessons from Two Years of Linux Journey

Comments
3 min read
gopin - Automate Version Pinning for Go Install Commands
Cover image for gopin - Automate Version Pinning for Go Install Commands

gopin - Automate Version Pinning for Go Install Commands

4
Comments
4 min read
Who Needs CSP?
Cover image for Who Needs CSP?

Who Needs CSP?

2
Comments 1
8 min read
L'atelier secret de GCP, ou comment déjouer les bandits de Noël
Cover image for L'atelier secret de GCP, ou comment déjouer les bandits de Noël

L'atelier secret de GCP, ou comment déjouer les bandits de Noël

3
Comments
5 min read
The Role of Data Analytics in Fighting Fraud and Corruption
Cover image for The Role of Data Analytics in Fighting Fraud and Corruption

The Role of Data Analytics in Fighting Fraud and Corruption

5
Comments 1
3 min read
Securing Your FastAPI APIs with JWT

Securing Your FastAPI APIs with JWT

1
Comments
6 min read
Safe and Smart Project Discovery. How NVIDIA Nemotron Beats Cloud AI for Integration Projects

Safe and Smart Project Discovery. How NVIDIA Nemotron Beats Cloud AI for Integration Projects

Comments
1 min read
Anyone Can Impersonate You on GitHub - Here's How to Protect Yourself

Anyone Can Impersonate You on GitHub - Here's How to Protect Yourself

11
Comments
7 min read
Stop using pip install... at least not directly. Secure your Python supply chain with pipq.
Cover image for Stop using pip install... at least not directly. Secure your Python supply chain with pipq.

Stop using pip install... at least not directly. Secure your Python supply chain with pipq.

Comments
4 min read
Deja de usar pip install... al menos no directamente. Asegura tu cadena de suministro de Python con pipq.
Cover image for Deja de usar pip install... al menos no directamente. Asegura tu cadena de suministro de Python con pipq.

Deja de usar pip install... al menos no directamente. Asegura tu cadena de suministro de Python con pipq.

Comments
4 min read
🚨 How I Survived a Token Crash and What I Learned About Protecting My Capital 🚨
Cover image for 🚨 How I Survived a Token Crash and What I Learned About Protecting My Capital 🚨

🚨 How I Survived a Token Crash and What I Learned About Protecting My Capital 🚨

2
Comments 1
3 min read
How to Implement Permissions in Your Application
Cover image for How to Implement Permissions in Your Application

How to Implement Permissions in Your Application

1
Comments
7 min read
DevSecOps: Modelo de madurez y alternativas de implementación
Cover image for DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know
Cover image for Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know

Cybersecurity Weekly #10: Safely Using AI-Generated Documents in 2025 — What Freelancers & Teams Should Know

2
Comments
4 min read
When Kafka Goes Kaiju: Building Monster-Scale Streaming Architectures
Cover image for When Kafka Goes Kaiju: Building Monster-Scale Streaming Architectures

When Kafka Goes Kaiju: Building Monster-Scale Streaming Architectures

Comments
7 min read
Arcjet: Developer-First Security for Modern Apps
Cover image for Arcjet: Developer-First Security for Modern Apps

Arcjet: Developer-First Security for Modern Apps

Comments
3 min read
Google's Antigravity Hacked in 24 Hours: Why AI Agents Need a New Security Architecture

Google's Antigravity Hacked in 24 Hours: Why AI Agents Need a New Security Architecture

1
Comments
3 min read
Taint analysis in PVS-Studio C and C++ analyzer

Taint analysis in PVS-Studio C and C++ analyzer

5
Comments
9 min read
HTTP Request and Response explained
Cover image for HTTP Request and Response explained

HTTP Request and Response explained

9
Comments
5 min read
Password Generator Challenge
Cover image for Password Generator Challenge

Password Generator Challenge

5
Comments 3
7 min read
loading...