Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unveiling the Threat of Clickjacking in Web Security

Unveiling the Threat of Clickjacking in Web Security

Comments
2 min read
SSL Certificate Management for SaaS: Cert Lifecycle, Uptime, and Brand Protection

SSL Certificate Management for SaaS: Cert Lifecycle, Uptime, and Brand Protection

Comments
3 min read
5 Best Practices for Securing Amazon Bedrock Agents from Prompt Injections.
Cover image for 5 Best Practices for Securing Amazon Bedrock Agents from Prompt Injections.

5 Best Practices for Securing Amazon Bedrock Agents from Prompt Injections.

3
Comments
2 min read
We built a Windows app that blocks trackers and encrypts your traffic automatically

We built a Windows app that blocks trackers and encrypts your traffic automatically

Comments
1 min read
🚀 Terraform Day 22: Secure Two-Tier Architecture on AWS (EC2 + RDS)
Cover image for 🚀 Terraform Day 22: Secure Two-Tier Architecture on AWS (EC2 + RDS)

🚀 Terraform Day 22: Secure Two-Tier Architecture on AWS (EC2 + RDS)

Comments
2 min read
The Complete WordPress Security Guide for Small Business Owners (2026)
Cover image for The Complete WordPress Security Guide for Small Business Owners (2026)

The Complete WordPress Security Guide for Small Business Owners (2026)

Comments
9 min read
The Top 10 Most Critical Mobile Phone Security Threats in 2025

The Top 10 Most Critical Mobile Phone Security Threats in 2025

Comments
5 min read
The Developer's Guide to Actually Private Apps: No Cloud, No Analytics, No Tracking
Cover image for The Developer's Guide to Actually Private Apps: No Cloud, No Analytics, No Tracking

The Developer's Guide to Actually Private Apps: No Cloud, No Analytics, No Tracking

1
Comments
19 min read
7 Urgent Fixes: Fortinet SAML Auth Bypass
Cover image for 7 Urgent Fixes: Fortinet SAML Auth Bypass

7 Urgent Fixes: Fortinet SAML Auth Bypass

2
Comments
6 min read
Proxy routing implementation playbook: building two lanes for identity and coverage

Proxy routing implementation playbook: building two lanes for identity and coverage

Comments
6 min read
EP 13: SQL Injection Isn't Dead - It Just Evolved

EP 13: SQL Injection Isn't Dead - It Just Evolved

Comments
3 min read
Zero Trust Made Simple: A Developer’s Take
Cover image for Zero Trust Made Simple: A Developer’s Take

Zero Trust Made Simple: A Developer’s Take

Comments
3 min read
How I discovered 16.7% of my Stripe revenue was bypassing fraud checks (and built a fix)
Cover image for How I discovered 16.7% of my Stripe revenue was bypassing fraud checks (and built a fix)

How I discovered 16.7% of my Stripe revenue was bypassing fraud checks (and built a fix)

Comments
2 min read
Auth Sessions Should Never Be Transient Across Boundaries

Auth Sessions Should Never Be Transient Across Boundaries

Comments
5 min read
EP 12: Stop Storing JWTs in LocalStorage

EP 12: Stop Storing JWTs in LocalStorage

Comments
3 min read
Reliable Shopify Webhooks: Idempotency, Retries, and Signature Verification
Cover image for Reliable Shopify Webhooks: Idempotency, Retries, and Signature Verification

Reliable Shopify Webhooks: Idempotency, Retries, and Signature Verification

Comments
5 min read
How should AI actions be authorized before execution? Built a small GPT to explore this

How should AI actions be authorized before execution? Built a small GPT to explore this

Comments
1 min read
Zero Trust Agentic AI Architecture: Designing Autonomy Behind Guardrails
Cover image for Zero Trust Agentic AI Architecture: Designing Autonomy Behind Guardrails

Zero Trust Agentic AI Architecture: Designing Autonomy Behind Guardrails

Comments
4 min read
Simplify Remote Access with Azure Bastion: Zero Trust Made Easy

Simplify Remote Access with Azure Bastion: Zero Trust Made Easy

Comments
1 min read
MULTI-CONTAINER SYSTEM + REVERSE PROXY (CONSOLIDATION)
Cover image for MULTI-CONTAINER SYSTEM + REVERSE PROXY (CONSOLIDATION)

MULTI-CONTAINER SYSTEM + REVERSE PROXY (CONSOLIDATION)

Comments
4 min read
Top 10 IaC Tools for DevOps in 2026: Which One Wins for Multi-Cloud? (Terraform, Pulumi, OpenTofu Compared)
Cover image for Top 10 IaC Tools for DevOps in 2026: Which One Wins for Multi-Cloud? (Terraform, Pulumi, OpenTofu Compared)

Top 10 IaC Tools for DevOps in 2026: Which One Wins for Multi-Cloud? (Terraform, Pulumi, OpenTofu Compared)

Comments
3 min read
Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP
Cover image for Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP

Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP

Comments
6 min read
Outil de Cybersécurité du Jour - Dec 28, 2025

Outil de Cybersécurité du Jour - Dec 28, 2025

Comments
3 min read
33 Million Accounts Exposed: What the Condé Nast Breach Teaches Engineering Leaders

33 Million Accounts Exposed: What the Condé Nast Breach Teaches Engineering Leaders

Comments
5 min read
👤 AWS 116: Who Goes There? - Creating Your First IAM User
Cover image for 👤 AWS 116: Who Goes There? - Creating Your First IAM User

👤 AWS 116: Who Goes There? - Creating Your First IAM User

Comments
3 min read
loading...