Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)
Cover image for Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)

Unlocking the Future of AI: A Deep Dive into the Model Context Protocol (MCP)

Comments
10 min read
AiHint Standard - Cryptographic Trust Verification for AI Agents
Cover image for AiHint Standard - Cryptographic Trust Verification for AI Agents

AiHint Standard - Cryptographic Trust Verification for AI Agents

Comments
4 min read
Connectivity Without Exposure
Cover image for Connectivity Without Exposure

Connectivity Without Exposure

5
Comments
4 min read
Jack Dorsey Unveils Offline Messaging App ‘Bitchat' with No Internet, Servers, or Accounts
Cover image for Jack Dorsey Unveils Offline Messaging App ‘Bitchat' with No Internet, Servers, or Accounts

Jack Dorsey Unveils Offline Messaging App ‘Bitchat' with No Internet, Servers, or Accounts

2
Comments
1 min read
Understanding OAuth 2.0 and OpenID Connect

Understanding OAuth 2.0 and OpenID Connect

Comments
3 min read
Elon Musk's AI chatbot churns out antisemitic posts days after update
Cover image for Elon Musk's AI chatbot churns out antisemitic posts days after update

Elon Musk's AI chatbot churns out antisemitic posts days after update

Comments
1 min read
Musk says Grok chatbot was 'manipulated' into praising Hitler
Cover image for Musk says Grok chatbot was 'manipulated' into praising Hitler

Musk says Grok chatbot was 'manipulated' into praising Hitler

Comments
1 min read
Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited
Cover image for Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited

Understanding Code Vulnerabilities: Real-World Examples and How They’re Exploited

Comments
1 min read
Don't Get Comfortable: Why Today's Mixed Reality is a Bridge, Not a Destination
Cover image for Don't Get Comfortable: Why Today's Mixed Reality is a Bridge, Not a Destination

Don't Get Comfortable: Why Today's Mixed Reality is a Bridge, Not a Destination

Comments
1 min read
OWASP Cornucopia Companion Edition
Cover image for OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

2
Comments
2 min read
Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!
Cover image for Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Comments
2 min read
Azure Function App Authentication

Azure Function App Authentication

Comments
1 min read
Under the Hood: Chronos Vault's Triple-Chain Defense System Explained
Cover image for Under the Hood: Chronos Vault's Triple-Chain Defense System Explained

Under the Hood: Chronos Vault's Triple-Chain Defense System Explained

1
Comments 1
5 min read
Networking Series 8: Access S3 from a VPC

Networking Series 8: Access S3 from a VPC

Comments
4 min read
AWS S3 Security Best Practices: A Complete Guide for 2025
Cover image for AWS S3 Security Best Practices: A Complete Guide for 2025

AWS S3 Security Best Practices: A Complete Guide for 2025

2
Comments
3 min read
Seccomp in Docker: Advanced System Call Filtering for a Hardened Container Runtime

Seccomp in Docker: Advanced System Call Filtering for a Hardened Container Runtime

Comments
4 min read
Which Browser Is Actually Safe for Privacy? (Test Results)
Cover image for Which Browser Is Actually Safe for Privacy? (Test Results)

Which Browser Is Actually Safe for Privacy? (Test Results)

Comments
2 min read
Prevent Website Scraping: Protect Your Content From Bots
Cover image for Prevent Website Scraping: Protect Your Content From Bots

Prevent Website Scraping: Protect Your Content From Bots

Comments
10 min read
Fake Job Offers Are Turning GitHub Repos Into a Trap
Cover image for Fake Job Offers Are Turning GitHub Repos Into a Trap

Fake Job Offers Are Turning GitHub Repos Into a Trap

1
Comments
5 min read
AWS Cloud Path Week 16: AWS Networking Workshop Part 6 (Final) -Understanding AWS Gateway Load Balancer
Cover image for AWS Cloud Path Week 16: AWS Networking Workshop Part 6 (Final) -Understanding AWS Gateway Load Balancer

AWS Cloud Path Week 16: AWS Networking Workshop Part 6 (Final) -Understanding AWS Gateway Load Balancer

2
Comments
3 min read
Networking Series 7: VPC Monitoring with Flow Logs
Cover image for Networking Series 7: VPC Monitoring with Flow Logs

Networking Series 7: VPC Monitoring with Flow Logs

Comments
4 min read
2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

10
Comments
7 min read
2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

10
Comments
5 min read
Is Legally Non-Compliant Behavior a Security Vulnerability?

Is Legally Non-Compliant Behavior a Security Vulnerability?

Comments
2 min read
The Tea app data breach: What really happened?

The Tea app data breach: What really happened?

Comments
2 min read
loading...