Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unpacking Application Security: A Comprehensive Threat Modeling Guide

Unpacking Application Security: A Comprehensive Threat Modeling Guide

1
Comments
12 min read
This AI Technique Protects Industrial Robots from Hackers: You Won't Believe How!

This AI Technique Protects Industrial Robots from Hackers: You Won't Believe How!

1
Comments
2 min read
How to rate limit APIs in Python
Cover image for How to rate limit APIs in Python

How to rate limit APIs in Python

Comments
3 min read
Modernize SAML Web Architectures the Right Way

Modernize SAML Web Architectures the Right Way

Comments
8 min read
Unkey vs Zuplo: The API Security Showdown That Matters
Cover image for Unkey vs Zuplo: The API Security Showdown That Matters

Unkey vs Zuplo: The API Security Showdown That Matters

Comments
7 min read
IAM in AWS

IAM in AWS

3
Comments
24 min read
Hackers Éticos

Hackers Éticos

1
Comments
3 min read
NDC Conferences: Content Security Policy: From newbie to advanced - Halvor Sakshaug - NDC Oslo 2025

NDC Conferences: Content Security Policy: From newbie to advanced - Halvor Sakshaug - NDC Oslo 2025

Comments
1 min read
AI-Powered Ghosts: Securing Your Smart Factory's IP

AI-Powered Ghosts: Securing Your Smart Factory's IP

5
Comments
2 min read
Unlocking Trustworthy AI: Verifiable Fine-Tuning with Zero-Knowledge Proofs

Unlocking Trustworthy AI: Verifiable Fine-Tuning with Zero-Knowledge Proofs

1
Comments
2 min read
Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan

Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan

1
Comments
2 min read
NDC Conferences: Anti-patterns in Security Monitoring - Truls Dahlsveen - NDC Oslo 2025

NDC Conferences: Anti-patterns in Security Monitoring - Truls Dahlsveen - NDC Oslo 2025

Comments
1 min read
When Your API Gateway Becomes Your Microservices’ Achilles’ Heel

When Your API Gateway Becomes Your Microservices’ Achilles’ Heel

Comments
5 min read
NDC Conferences: A Positive Security Talk - Martin Londal - NDC Oslo 2025

NDC Conferences: A Positive Security Talk - Martin Londal - NDC Oslo 2025

Comments
1 min read
Top 15 Kubernetes Security Tools and Solutions

Top 15 Kubernetes Security Tools and Solutions

1
Comments
13 min read
Ghost in the Machine: Securing Industrial Control Systems with Adaptive Watermarks by Arvind Sundararajan

Ghost in the Machine: Securing Industrial Control Systems with Adaptive Watermarks by Arvind Sundararajan

1
Comments
1 min read
The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks

The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks

1
Comments
2 min read
Difference Between SOC 1 and SOC 2: A Complete Guide

Difference Between SOC 1 and SOC 2: A Complete Guide

Comments
2 min read
Signing and Encryption With JWS and JWE
Cover image for Signing and Encryption With JWS and JWE

Signing and Encryption With JWS and JWE

2
Comments
7 min read
Outil de Cybersécurité du Jour - Sep 2, 2025

Outil de Cybersécurité du Jour - Sep 2, 2025

5
Comments
2 min read
DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura
Cover image for DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura

DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura

Comments
3 min read
📰 Major Tech News: Oct 2nd, 2025
Cover image for 📰 Major Tech News: Oct 2nd, 2025

📰 Major Tech News: Oct 2nd, 2025

27
Comments 4
4 min read
The Invisible Shield: AI-Powered Watermarks Protecting Industrial Machines

The Invisible Shield: AI-Powered Watermarks Protecting Industrial Machines

1
Comments
2 min read
📰 Major Tech News: Oct 1st, 2025
Cover image for 📰 Major Tech News: Oct 1st, 2025

📰 Major Tech News: Oct 1st, 2025

26
Comments 4
5 min read
Tracking outbound API calls from your application: why, what worked (and what didn’t)
Cover image for Tracking outbound API calls from your application: why, what worked (and what didn’t)

Tracking outbound API calls from your application: why, what worked (and what didn’t)

Comments
3 min read
loading...