Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ghost in the Machine: Securing Industrial Control Systems with Adaptive Watermarks by Arvind Sundararajan

Ghost in the Machine: Securing Industrial Control Systems with Adaptive Watermarks by Arvind Sundararajan

1
Comments
1 min read
The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks

The Invisible Guardian: Securing Industrial Machine Tools with AI-Powered Adaptive Watermarks

1
Comments
2 min read
Difference Between SOC 1 and SOC 2: A Complete Guide

Difference Between SOC 1 and SOC 2: A Complete Guide

Comments
2 min read
Signing and Encryption With JWS and JWE
Cover image for Signing and Encryption With JWS and JWE

Signing and Encryption With JWS and JWE

3
Comments
7 min read
Lecciones aprendidas de la certificación AWS Security Specialty 🥇

Lecciones aprendidas de la certificación AWS Security Specialty 🥇

Comments
3 min read
Outil de Cybersécurité du Jour - Sep 2, 2025

Outil de Cybersécurité du Jour - Sep 2, 2025

5
Comments
2 min read
DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura
Cover image for DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura

DNS: O que é, como funciona e como a Cloudflare pode tornar sua navegação mais segura

Comments
3 min read
📰 Major Tech News: Oct 1st, 2025
Cover image for 📰 Major Tech News: Oct 1st, 2025

📰 Major Tech News: Oct 1st, 2025

26
Comments 4
5 min read
The Invisible Shield: AI-Powered Watermarks Protecting Industrial Machines

The Invisible Shield: AI-Powered Watermarks Protecting Industrial Machines

1
Comments
2 min read
Tracking outbound API calls from your application: why, what worked (and what didn’t)
Cover image for Tracking outbound API calls from your application: why, what worked (and what didn’t)

Tracking outbound API calls from your application: why, what worked (and what didn’t)

Comments
3 min read
Adaptive Radios: Teaching Machines to Outsmart Signal Jammers

Adaptive Radios: Teaching Machines to Outsmart Signal Jammers

Comments 2
2 min read
📰 Major Tech News: Oct 2nd, 2025
Cover image for 📰 Major Tech News: Oct 2nd, 2025

📰 Major Tech News: Oct 2nd, 2025

27
Comments 4
4 min read
Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)
Cover image for Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)

Authenticate GitLab Pipelines to AWS with OIDC (No Static Keys 🚀)

Comments
2 min read
From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C
Cover image for From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C

From Kashmir to the World: Launching the Universal DID-Native Addressing (UDNA) Community Group at W3C

Comments
2 min read
Why did we disable CSRF protection?
Cover image for Why did we disable CSRF protection?

Why did we disable CSRF protection?

Comments
3 min read
Webauthn authentication with React and Nest.js

Webauthn authentication with React and Nest.js

2
Comments
13 min read
AWS Security & Cost Optimization Arsenal: From CLI to Lambda Automation

AWS Security & Cost Optimization Arsenal: From CLI to Lambda Automation

Comments
3 min read
Episode 1: Hunting Deprecated Lambda Runtimes — Before They Become Problems

Episode 1: Hunting Deprecated Lambda Runtimes — Before They Become Problems

Comments
6 min read
Invisible Ink for AI: Proof of Creation in a Generative World

Invisible Ink for AI: Proof of Creation in a Generative World

Comments
2 min read
MDM Software Functionalities That Improve IT Security
Cover image for MDM Software Functionalities That Improve IT Security

MDM Software Functionalities That Improve IT Security

Comments
4 min read
Why does big tech not run Accessibility bug bounties?
Cover image for Why does big tech not run Accessibility bug bounties?

Why does big tech not run Accessibility bug bounties?

2
Comments 3
3 min read
Outil de Cybersécurité du Jour - Sep 1, 2025

Outil de Cybersécurité du Jour - Sep 1, 2025

1
Comments
3 min read
Authentication and authorization : difference

Authentication and authorization : difference

Comments
2 min read
Kinde new features in August

Kinde new features in August

1
Comments
1 min read
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan

Comments
2 min read
loading...