Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Designing Secure Plugin Architectures for Desktop Applications
Cover image for Designing Secure Plugin Architectures for Desktop Applications

Designing Secure Plugin Architectures for Desktop Applications

Comments
12 min read
Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)
Cover image for Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

Designing a Secure AWS Landing Zone with Control Tower (What Most Blogs Don’t Tell You)

3
Comments 1
4 min read
OAuth Is Simpler Than You Think
Cover image for OAuth Is Simpler Than You Think

OAuth Is Simpler Than You Think

Comments 1
6 min read
AiCybr: 60+ Privacy-Focused Tools in One Place

AiCybr: 60+ Privacy-Focused Tools in One Place

Comments
3 min read
Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Can a JPG File Contain Malware? Uncovering the “Fake Image” Backdoor

Comments
4 min read
Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.
Cover image for Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Day 8: Never Hardcode Keys. Connecting Lambda to APIs using AWS Secrets Manager.

Comments
1 min read
Agent Security Explained By Dawn Song
Cover image for Agent Security Explained By Dawn Song

Agent Security Explained By Dawn Song

Comments
3 min read
New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse
Cover image for New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

New Threats in Open Source: Worms, AI-Driven Malware, and Trust Abuse

Comments 1
15 min read
Cybersecurity Weekly: How Face ID & Fingerprint Systems Get Spoofed in 2026
Cover image for Cybersecurity Weekly: How Face ID & Fingerprint Systems Get Spoofed in 2026

Cybersecurity Weekly: How Face ID & Fingerprint Systems Get Spoofed in 2026

2
Comments
2 min read
Meet Orion-Belt, Go ZeroTrust Bastion
Cover image for Meet Orion-Belt, Go ZeroTrust Bastion

Meet Orion-Belt, Go ZeroTrust Bastion

Comments
3 min read
How do I backup my identity files (SSH/GPG) without compromising them?
Cover image for How do I backup my identity files (SSH/GPG) without compromising them?

How do I backup my identity files (SSH/GPG) without compromising them?

Comments
3 min read
AI News Roundup: AliSQL Vector MySQL, Notepad++ Supply Chain, and Europe’s Digital Autonomy

AI News Roundup: AliSQL Vector MySQL, Notepad++ Supply Chain, and Europe’s Digital Autonomy

2
Comments
2 min read
🔒 Deep Dive: Production-Grade Environment Variable Automation – Engineering Secrets at Scale
Cover image for 🔒 Deep Dive: Production-Grade Environment Variable Automation – Engineering Secrets at Scale

🔒 Deep Dive: Production-Grade Environment Variable Automation – Engineering Secrets at Scale

Comments
5 min read
AI News Roundup: Claude Opus 4.6, GPT‑5.3‑Codex, and Psychometric Jailbreaks

AI News Roundup: Claude Opus 4.6, GPT‑5.3‑Codex, and Psychometric Jailbreaks

2
Comments
2 min read
DDSS: Step-by-Step Explanation

DDSS: Step-by-Step Explanation

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.