Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

1
Comments
2 min read
Connections and workflows updates in September

Connections and workflows updates in September

6
Comments
1 min read
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

Comments
4 min read
Outil de Cybersécurité du Jour - Aug 27, 2025

Outil de Cybersécurité du Jour - Aug 27, 2025

Comments
3 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Essential JWT Security Best Practices for Developers
Cover image for Essential JWT Security Best Practices for Developers

Essential JWT Security Best Practices for Developers

19
Comments 6
6 min read
The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite
Cover image for The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

1
Comments
10 min read
Agentic AI in Cybersecurity: The Next Frontier for Human-Centric Defense

Agentic AI in Cybersecurity: The Next Frontier for Human-Centric Defense

Comments
3 min read
Mastering Identity Management in Microsoft Entra ID: From Users to Roles
Cover image for Mastering Identity Management in Microsoft Entra ID: From Users to Roles

Mastering Identity Management in Microsoft Entra ID: From Users to Roles

6
Comments
3 min read
How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

1
Comments 1
3 min read
Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Comments
4 min read
Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide
Cover image for Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

6
Comments
3 min read
Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later
Cover image for Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

2
Comments
3 min read
Building an Enterprise Data Access Layer: The Foundation
Cover image for Building an Enterprise Data Access Layer: The Foundation

Building an Enterprise Data Access Layer: The Foundation

2
Comments
2 min read
Introducing SecureCheck: An Open-Source Security Scanner for Web Applications
Cover image for Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Comments
2 min read
Module 2 — Derived Identities and Secure Export
Cover image for Module 2 — Derived Identities and Secure Export

Module 2 — Derived Identities and Secure Export

1
Comments
4 min read
Linus Tech Tips (LTT): I Gave Him an IMPOSSIBLE Task

Linus Tech Tips (LTT): I Gave Him an IMPOSSIBLE Task

Comments
1 min read
How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers
Cover image for How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

Comments
2 min read
How to Maintain Compliance and Security in Finance
Cover image for How to Maintain Compliance and Security in Finance

How to Maintain Compliance and Security in Finance

Comments
2 min read
Enhancing Security in Apps Script

Enhancing Security in Apps Script

1
Comments
3 min read
🛡️ Content Security Policy (CSP): A Complete Guide for Developers
Cover image for 🛡️ Content Security Policy (CSP): A Complete Guide for Developers

🛡️ Content Security Policy (CSP): A Complete Guide for Developers

2
Comments
3 min read
Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)
Cover image for Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

2
Comments
4 min read
HashGate - HMAC Authentication Implementation

HashGate - HMAC Authentication Implementation

Comments
7 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Build an Email OTP Verification System in Node.js (Step-by-Step)
Cover image for Build an Email OTP Verification System in Node.js (Step-by-Step)

Build an Email OTP Verification System in Node.js (Step-by-Step)

1
Comments
11 min read
loading...