Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a CMS-Level Firewall: Why Application Context Matters
Cover image for Building a CMS-Level Firewall: Why Application Context Matters

Building a CMS-Level Firewall: Why Application Context Matters

Comments 1
10 min read
🚀 Terraform Day 21: Policy & Governance Automation on AWS
Cover image for 🚀 Terraform Day 21: Policy & Governance Automation on AWS

🚀 Terraform Day 21: Policy & Governance Automation on AWS

Comments
2 min read
Hashicorp Vault: Fine-Grained Access Control with Policies
Cover image for Hashicorp Vault: Fine-Grained Access Control with Policies

Hashicorp Vault: Fine-Grained Access Control with Policies

Comments
4 min read
JWT vs Cookies in Next.js: What Should We Really Use for Authentication?
Cover image for JWT vs Cookies in Next.js: What Should We Really Use for Authentication?

JWT vs Cookies in Next.js: What Should We Really Use for Authentication?

Comments
3 min read
How I Built an AI Password Automation Tool with browser-use
Cover image for How I Built an AI Password Automation Tool with browser-use

How I Built an AI Password Automation Tool with browser-use

Comments
1 min read
Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene
Cover image for Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene

Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene

1
Comments
4 min read
Kubernetes Security Control Plane vs Data Plane

Kubernetes Security Control Plane vs Data Plane

1
Comments
4 min read
The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back
Cover image for The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

The Silent Pandemic: How Viral File Spread Threatens Our Digital Safety and How to Fight Back

Comments
4 min read
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects
Cover image for Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Comments
2 min read
Protecting Sensitive Data Using Envelope Encryption
Cover image for Protecting Sensitive Data Using Envelope Encryption

Protecting Sensitive Data Using Envelope Encryption

Comments
6 min read
Why Your Honeypot Catches Humans (Not Bots)

Why Your Honeypot Catches Humans (Not Bots)

2
Comments
3 min read
👉 Por que o roteador da operadora não deveria ser o coração da sua rede

👉 Por que o roteador da operadora não deveria ser o coração da sua rede

1
Comments 1
3 min read
Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective
Cover image for Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective

Comments
3 min read
Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Rust Weekly Log: Tracing, Observability & Cryptographic Hashes

Comments
1 min read
I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint
Cover image for I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

Comments
23 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.