Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

Using Token Exchange with ToolHive and Okta for MCP Server to GraphQL Authentication

4
Comments
9 min read
The Silent Threat: Visually Triggered AI Hijacking

The Silent Threat: Visually Triggered AI Hijacking

Comments
2 min read
Using Podman as a Docker alternative

Using Podman as a Docker alternative

Comments
5 min read
The Dark Side of Automation: When "Auto" Breaks Your Security Model
Cover image for The Dark Side of Automation: When "Auto" Breaks Your Security Model

The Dark Side of Automation: When "Auto" Breaks Your Security Model

Comments
7 min read
đź“° Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools
Cover image for đź“° Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools

đź“° Major Tech News: November 2nd, 2025: Apple Vision Pro Delay, Meta's Llama 4 Debate, and EU Probes Amazon's AI Hiring Tools

11
Comments
6 min read
Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI
Cover image for Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI

Cloud Security: Concepts, Best Practices, Challenges, and the Role of AI

Comments
5 min read
Securing Container Registries: Best Practices for Safe Image Management

Securing Container Registries: Best Practices for Safe Image Management

Comments
2 min read
The Quantum Threat Nobody's Taking Seriously (But Should)
Cover image for The Quantum Threat Nobody's Taking Seriously (But Should)

The Quantum Threat Nobody's Taking Seriously (But Should)

Comments
3 min read
Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps
Cover image for Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Comments
6 min read
A Developer's Guide to Useful Apache Modules

A Developer's Guide to Useful Apache Modules

5
Comments
3 min read
Trusted Publishers: Making Package Publishing Safer – What You Need to Know

Trusted Publishers: Making Package Publishing Safer – What You Need to Know

Comments
5 min read
Returning HTTP 404 Responses Instead of 403 for Unauthorised Access
Cover image for Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

Returning HTTP 404 Responses Instead of 403 for Unauthorised Access

15
Comments 13
8 min read
POR QUÉ UN FONDO DE EMERGENCIA PUEDE SALVAR TUS FINANZAS

POR QUÉ UN FONDO DE EMERGENCIA PUEDE SALVAR TUS FINANZAS

Comments
2 min read
Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction
Cover image for Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

3
Comments
6 min read
Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple
Cover image for Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.