Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
7 Cybersecurity Concerns Related to The MCP Protocol
Cover image for 7 Cybersecurity Concerns Related to The MCP Protocol

7 Cybersecurity Concerns Related to The MCP Protocol

Comments
5 min read
How to Deploy a Hardened Firezone (WireGuard) + Classic IPsec VPN on Google Cloud with Terraform 🚀

How to Deploy a Hardened Firezone (WireGuard) + Classic IPsec VPN on Google Cloud with Terraform 🚀

Comments
5 min read
🏰 Day 20 of #30DaysOfSolidity — Build a Secure Digital Vault (FortKnox)
Cover image for 🏰 Day 20 of #30DaysOfSolidity — Build a Secure Digital Vault (FortKnox)

🏰 Day 20 of #30DaysOfSolidity — Build a Secure Digital Vault (FortKnox)

Comments
4 min read
How to Protect Your Site from Cyber Attacks: Website Security Guide 2025

How to Protect Your Site from Cyber Attacks: Website Security Guide 2025

2
Comments 1
6 min read
AWS Lambda + Secrets Manager

AWS Lambda + Secrets Manager

Comments
3 min read
AWS Organizations Best Practices: The Critical Configurations Most Teams Miss

AWS Organizations Best Practices: The Critical Configurations Most Teams Miss

1
Comments
10 min read
PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes
Cover image for PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

2
Comments
6 min read
It Depends: Modernizing Dependency Management in the age of AI
Cover image for It Depends: Modernizing Dependency Management in the age of AI

It Depends: Modernizing Dependency Management in the age of AI

1
Comments 2
3 min read
AI Security Testing: How to Find Vulnerabilities in AI Applications
Cover image for AI Security Testing: How to Find Vulnerabilities in AI Applications

AI Security Testing: How to Find Vulnerabilities in AI Applications

Comments
5 min read
How SMBs Can Strengthen Security with a White-Label Password Manager
Cover image for How SMBs Can Strengthen Security with a White-Label Password Manager

How SMBs Can Strengthen Security with a White-Label Password Manager

Comments
5 min read
🔒 5 Best Practices to Keep Your Website Secure
Cover image for 🔒 5 Best Practices to Keep Your Website Secure

🔒 5 Best Practices to Keep Your Website Secure

Comments
3 min read
I Was Tired of Awful Online Cipher Tools, So I Built the One I Always Wanted

I Was Tired of Awful Online Cipher Tools, So I Built the One I Always Wanted

Comments
4 min read
Trinity Protocol is Live: The Technical Deep Dive Into Real Multi-Chain Consensus
Cover image for Trinity Protocol is Live: The Technical Deep Dive Into Real Multi-Chain Consensus

Trinity Protocol is Live: The Technical Deep Dive Into Real Multi-Chain Consensus

Comments 3
8 min read
BIP-39 and web3 wallet seed phrases: A high-level overview.
Cover image for BIP-39 and web3 wallet seed phrases: A high-level overview.

BIP-39 and web3 wallet seed phrases: A high-level overview.

1
Comments
3 min read
Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt
Cover image for Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt

Simulated Attack: How a 33% consensus risk puts Sui one incident away from a network halt

Comments
4 min read
MCP Weekly: Security and Large-Scale Enterprise Integration
Cover image for MCP Weekly: Security and Large-Scale Enterprise Integration

MCP Weekly: Security and Large-Scale Enterprise Integration

27
Comments 2
7 min read
Dev.to Tag Hacking
Cover image for Dev.to Tag Hacking

Dev.to Tag Hacking

5
Comments 2
3 min read
Prompt injection with web browsers!

Prompt injection with web browsers!

Comments
2 min read
Building Composable RLS: Enterprise Data Security on Autopilot
Cover image for Building Composable RLS: Enterprise Data Security on Autopilot

Building Composable RLS: Enterprise Data Security on Autopilot

3
Comments
2 min read
Building SafeScript: Our Journey Creating a Security Tool for AI-Generated Code

Building SafeScript: Our Journey Creating a Security Tool for AI-Generated Code

Comments
4 min read
Why I Stopped Using LocalStorage for Auth and What You Should Do Instead
Cover image for Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

2
Comments
7 min read
Anyone Can Commit Code as You on GitHub (Here's How to Stop Them)
Cover image for Anyone Can Commit Code as You on GitHub (Here's How to Stop Them)

Anyone Can Commit Code as You on GitHub (Here's How to Stop Them)

118
Comments 39
7 min read
Self-Sovereign Identity's Privacy Blind Spot: Why DIDs Need Confidential Computing

Self-Sovereign Identity's Privacy Blind Spot: Why DIDs Need Confidential Computing

6
Comments 3
3 min read
Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Comments
18 min read
The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

Comments
2 min read
loading...