Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Secure SSH Access with Short-Lived Certificates
Cover image for How to Secure SSH Access with Short-Lived Certificates

How to Secure SSH Access with Short-Lived Certificates

1
Comments
4 min read
How to Configure SSL Certificates in Nginx for Secure HTTPS Connections
Cover image for How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

1
Comments
2 min read
AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive
Cover image for AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive

AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive

Comments
4 min read
☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements
Cover image for ☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

19
Comments 9
2 min read
RBAC Models Explained

RBAC Models Explained

3
Comments 4
5 min read
OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up
Cover image for OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up

OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up

13
Comments
5 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
I built an AI-powered npm dependency scanner – give it 30 seconds & a package.json

I built an AI-powered npm dependency scanner – give it 30 seconds & a package.json

Comments
1 min read
Revival Hijacking: How Deleted PyPI Packages Become Threats
Cover image for Revival Hijacking: How Deleted PyPI Packages Become Threats

Revival Hijacking: How Deleted PyPI Packages Become Threats

Comments
6 min read
🧠 Tired of bloated ACLs? Meet scode-acl: A minimal, schema-driven, token-friendly access control system

🧠 Tired of bloated ACLs? Meet scode-acl: A minimal, schema-driven, token-friendly access control system

6
Comments 1
2 min read
Deploying and Securing a 3-tier application in Openshift

Deploying and Securing a 3-tier application in Openshift

Comments
1 min read
Redacting Sensitive Data On-the-Fly with S3 Object Lambda
Cover image for Redacting Sensitive Data On-the-Fly with S3 Object Lambda

Redacting Sensitive Data On-the-Fly with S3 Object Lambda

Comments
6 min read
Promptfoo x Qwen3-Coder: Unmasking Vulnerabilities in 480 Billion Parameters
Cover image for Promptfoo x Qwen3-Coder: Unmasking Vulnerabilities in 480 Billion Parameters

Promptfoo x Qwen3-Coder: Unmasking Vulnerabilities in 480 Billion Parameters

6
Comments
14 min read
How I Built NetNerve That Made Headlines a Day After It's Launch
Cover image for How I Built NetNerve That Made Headlines a Day After It's Launch

How I Built NetNerve That Made Headlines a Day After It's Launch

2
Comments
2 min read
Network Basics for Security
Cover image for Network Basics for Security

Network Basics for Security

2
Comments
1 min read
Security news weekly round-up - 1st August 2025
Cover image for Security news weekly round-up - 1st August 2025

Security news weekly round-up - 1st August 2025

1
Comments 1
3 min read
Linus Tech Tips (LTT): Slow Internet Is Good For Consumers Actually /s - WAN Show July 25, 2025

Linus Tech Tips (LTT): Slow Internet Is Good For Consumers Actually /s - WAN Show July 25, 2025

5
Comments
1 min read
RoboShellGuard: Building an AI-Assisted Command Approval System for SSH Security
Cover image for RoboShellGuard: Building an AI-Assisted Command Approval System for SSH Security

RoboShellGuard: Building an AI-Assisted Command Approval System for SSH Security

Comments
5 min read
Building Trust in the AI Agent Economy: Sigstore Meets Agent2Agent

Building Trust in the AI Agent Economy: Sigstore Meets Agent2Agent

Comments
4 min read
Strengthening Web Security with HTTP Headers in Express.js

Strengthening Web Security with HTTP Headers in Express.js

Comments
3 min read
Building an Azure Misconfiguration Scanner: Starting Over

Building an Azure Misconfiguration Scanner: Starting Over

Comments
2 min read
Chaos Engineering for Security: Breaking Systems To Strengthen Defenses
Cover image for Chaos Engineering for Security: Breaking Systems To Strengthen Defenses

Chaos Engineering for Security: Breaking Systems To Strengthen Defenses

1
Comments
7 min read
Starting My Web2 & Web3 Security Journey as a novice
Cover image for Starting My Web2 & Web3 Security Journey as a novice

Starting My Web2 & Web3 Security Journey as a novice

Comments 2
1 min read
Reverse Proxy Deep Dive: The Hidden Complexity of Service Discovery
Cover image for Reverse Proxy Deep Dive: The Hidden Complexity of Service Discovery

Reverse Proxy Deep Dive: The Hidden Complexity of Service Discovery

Comments
8 min read
Regulation vs. Responsibility: Where developers must lead

Regulation vs. Responsibility: Where developers must lead

2
Comments
3 min read
loading...