Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Every Developer Should Care About Metadata Leaks
Cover image for Why Every Developer Should Care About Metadata Leaks

Why Every Developer Should Care About Metadata Leaks

1
Comments
5 min read
🔐 How to Set Up SSH Access for a Private GitLab Repository

🔐 How to Set Up SSH Access for a Private GitLab Repository

5
Comments
3 min read
Indirect Prompt Injection: A New Security Concern in MCP Servers
Cover image for Indirect Prompt Injection: A New Security Concern in MCP Servers

Indirect Prompt Injection: A New Security Concern in MCP Servers

6
Comments
2 min read
First Steps into Darkness: My First Malware Analysis Experience

First Steps into Darkness: My First Malware Analysis Experience

Comments
3 min read
Controlling and Securing Azure Storage Access: A Step-by-Step Guide
Cover image for Controlling and Securing Azure Storage Access: A Step-by-Step Guide

Controlling and Securing Azure Storage Access: A Step-by-Step Guide

1
Comments
5 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Cover image for Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan

The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan

1
Comments
2 min read
Chronos Vault Trinity Protocol Now Live on Testnet: Revolutionizing Multi-Chain Security
Cover image for Chronos Vault Trinity Protocol Now Live on Testnet: Revolutionizing Multi-Chain Security

Chronos Vault Trinity Protocol Now Live on Testnet: Revolutionizing Multi-Chain Security

1
Comments
3 min read
Securing a REST API Created With Spring Boot 3 Using Spring Security with username-password And JWT Authentication
Cover image for Securing a REST API Created With Spring Boot 3 Using Spring Security with username-password And JWT Authentication

Securing a REST API Created With Spring Boot 3 Using Spring Security with username-password And JWT Authentication

1
Comments
11 min read
Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures
Cover image for Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures

Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures

2
Comments
2 min read
AI Watermarks: Guarding Your Million-Dollar Machines Against Data Hijackers

AI Watermarks: Guarding Your Million-Dollar Machines Against Data Hijackers

1
Comments
2 min read
Episode 2: The MFA Enforcement Scanner — Automating Your Security Blind Spot

Episode 2: The MFA Enforcement Scanner — Automating Your Security Blind Spot

Comments
8 min read
Troubleshooting Broken Function Level Authorization
Cover image for Troubleshooting Broken Function Level Authorization

Troubleshooting Broken Function Level Authorization

1
Comments
16 min read
Unpacking Application Security: A Comprehensive Threat Modeling Guide

Unpacking Application Security: A Comprehensive Threat Modeling Guide

1
Comments
12 min read
How to rate limit APIs in Python
Cover image for How to rate limit APIs in Python

How to rate limit APIs in Python

Comments
3 min read
This AI Technique Protects Industrial Robots from Hackers: You Won't Believe How!

This AI Technique Protects Industrial Robots from Hackers: You Won't Believe How!

1
Comments
2 min read
Modernize SAML Web Architectures the Right Way

Modernize SAML Web Architectures the Right Way

Comments
8 min read
Unkey vs Zuplo: The API Security Showdown That Matters
Cover image for Unkey vs Zuplo: The API Security Showdown That Matters

Unkey vs Zuplo: The API Security Showdown That Matters

Comments
7 min read
IAM in AWS

IAM in AWS

3
Comments
24 min read
Hackers Éticos

Hackers Éticos

1
Comments
3 min read
AI-Powered Ghosts: Securing Your Smart Factory's IP

AI-Powered Ghosts: Securing Your Smart Factory's IP

5
Comments
2 min read
Unlocking Trustworthy AI: Verifiable Fine-Tuning with Zero-Knowledge Proofs

Unlocking Trustworthy AI: Verifiable Fine-Tuning with Zero-Knowledge Proofs

1
Comments
2 min read
Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan

Fort Knox for Factories: AI-Powered Watermarks for Industrial Control Code by Arvind Sundararajan

1
Comments
2 min read
When Your API Gateway Becomes Your Microservices’ Achilles’ Heel

When Your API Gateway Becomes Your Microservices’ Achilles’ Heel

Comments
5 min read
Top 15 Kubernetes Security Tools and Solutions

Top 15 Kubernetes Security Tools and Solutions

1
Comments
13 min read
loading...