Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Secure Local Video Player in Electron
Cover image for Building a Secure Local Video Player in Electron

Building a Secure Local Video Player in Electron

Comments
5 min read
OWASP Cornucopia 3.0 - A call for card game designers!
Cover image for OWASP Cornucopia 3.0 - A call for card game designers!

OWASP Cornucopia 3.0 - A call for card game designers!

1
Comments
2 min read
The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance
Cover image for The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

The Production-Ready GenAI Platform: A Complete AWS Architecture for Codified Governance

Comments
4 min read
Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

Your MCP Agents Can Access Everything. They Can't Prove Who They Are. Here's Why That's Dangerous.

1
Comments
6 min read
Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Lean Startup Methodology Explained: How I Learned To Build Smarter Businesses

Comments
7 min read
The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

The 24-Hour SaaS Breach Playbook, Powered by AI (But Rooted in Operational Discipline)

Comments
5 min read
Proof-Carrying Plans: Guaranteeing AI Action by Arvind Sundararajan

Proof-Carrying Plans: Guaranteeing AI Action by Arvind Sundararajan

Comments
2 min read
Error after Angular version 18 upgrade: Content Security Policy Violation

Error after Angular version 18 upgrade: Content Security Policy Violation

Comments
1 min read
WRITE-UP N1CTF 2025

WRITE-UP N1CTF 2025

Comments
6 min read
Project: Cloud Guardrails with OPA + Conftest + Config/SecurityHub + Auto-Remediation

Project: Cloud Guardrails with OPA + Conftest + Config/SecurityHub + Auto-Remediation

2
Comments
9 min read
From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App
Cover image for From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App

From API Keys to E2EE: A Practical Guide to Securing Your Real-Time App

6
Comments
5 min read
Implementing Multitenancy in Auth0 Using Organizations: A Complete Guide

Implementing Multitenancy in Auth0 Using Organizations: A Complete Guide

Comments
6 min read
Security for Bootstrapped Startups: The $0 Budget Checklist (2025)
Cover image for Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

1
Comments 2
10 min read
Servicios de AWS que un Cloud Security Engineer debe dominar, aunque NO sean "servicios de seguridad" per se

Servicios de AWS que un Cloud Security Engineer debe dominar, aunque NO sean "servicios de seguridad" per se

Comments
3 min read
A Better Password Authentication Flow.. hear me out
Cover image for A Better Password Authentication Flow.. hear me out

A Better Password Authentication Flow.. hear me out

3
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.