Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
BSides SF 2026: Looking At Security Beyond The Next Big Bet
Cover image for BSides SF 2026: Looking At Security Beyond The Next Big Bet

BSides SF 2026: Looking At Security Beyond The Next Big Bet

Comments
7 min read
ArgoCD vs Flux 2025: Secure CI/CD for Kubernetes

ArgoCD vs Flux 2025: Secure CI/CD for Kubernetes

Comments
5 min read
Empowering the Invisible: Building a Secure AI Insurance Agent with Auth0 Token Vault

Empowering the Invisible: Building a Secure AI Insurance Agent with Auth0 Token Vault

Comments
2 min read
The Cost Circuit Breaker: How We Prevent Runaway Spending Across 9 AI Agents
Cover image for The Cost Circuit Breaker: How We Prevent Runaway Spending Across 9 AI Agents

The Cost Circuit Breaker: How We Prevent Runaway Spending Across 9 AI Agents

Comments
13 min read
Securing Plex on Synology NAS with Post-Quantum Cryptography via Cloudflare Tunnel

Securing Plex on Synology NAS with Post-Quantum Cryptography via Cloudflare Tunnel

Comments
15 min read
One decorator to make any Python function auditable

One decorator to make any Python function auditable

Comments
2 min read
I built a forensics documentation tool because my university course drove me crazy
Cover image for I built a forensics documentation tool because my university course drove me crazy

I built a forensics documentation tool because my university course drove me crazy

Comments
2 min read
Your MCP servers are unsigned. Here is why that matters.

Your MCP servers are unsigned. Here is why that matters.

Comments
3 min read
OAuth vs JWT: Choosing the Right Tool for Developers

OAuth vs JWT: Choosing the Right Tool for Developers

Comments
5 min read
Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy

Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy

Comments
6 min read
Hardening Your Deploynix Server: A Step-by-Step Security Audit
Cover image for Hardening Your Deploynix Server: A Step-by-Step Security Audit

Hardening Your Deploynix Server: A Step-by-Step Security Audit

Comments
7 min read
How AI Is Transforming Cybersecurity and Compliance — A Deep Dive into PCI DSS

How AI Is Transforming Cybersecurity and Compliance — A Deep Dive into PCI DSS

Comments
7 min read
Uncensoring AI: How to Surgically Remove an LLM's Refusal Mechanism
Cover image for Uncensoring AI: How to Surgically Remove an LLM's Refusal Mechanism

Uncensoring AI: How to Surgically Remove an LLM's Refusal Mechanism

1
Comments
2 min read
Escaping Pilot Purgatory: How Semantix-ai v0.1.5 Built the Immutable Trust Layer for AI Agents

Escaping Pilot Purgatory: How Semantix-ai v0.1.5 Built the Immutable Trust Layer for AI Agents

Comments
7 min read
Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Um resumo sobre Fake Delay – Protegendo contra User Enumeration

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.