Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 1st August 2025
Cover image for Security news weekly round-up - 1st August 2025

Security news weekly round-up - 1st August 2025

1
Comments 1
3 min read
Linus Tech Tips (LTT): Slow Internet Is Good For Consumers Actually /s - WAN Show July 25, 2025

Linus Tech Tips (LTT): Slow Internet Is Good For Consumers Actually /s - WAN Show July 25, 2025

5
Comments
1 min read
RoboShellGuard: Building an AI-Assisted Command Approval System for SSH Security
Cover image for RoboShellGuard: Building an AI-Assisted Command Approval System for SSH Security

RoboShellGuard: Building an AI-Assisted Command Approval System for SSH Security

Comments
5 min read
Building Trust in the AI Agent Economy: Sigstore Meets Agent2Agent

Building Trust in the AI Agent Economy: Sigstore Meets Agent2Agent

Comments
4 min read
Strengthening Web Security with HTTP Headers in Express.js

Strengthening Web Security with HTTP Headers in Express.js

Comments
3 min read
Building an Azure Misconfiguration Scanner: Starting Over

Building an Azure Misconfiguration Scanner: Starting Over

Comments
2 min read
Chaos Engineering for Security: Breaking Systems To Strengthen Defenses
Cover image for Chaos Engineering for Security: Breaking Systems To Strengthen Defenses

Chaos Engineering for Security: Breaking Systems To Strengthen Defenses

1
Comments
7 min read
Starting My Web2 & Web3 Security Journey as a novice
Cover image for Starting My Web2 & Web3 Security Journey as a novice

Starting My Web2 & Web3 Security Journey as a novice

Comments 2
1 min read
Reverse Proxy Deep Dive: The Hidden Complexity of Service Discovery
Cover image for Reverse Proxy Deep Dive: The Hidden Complexity of Service Discovery

Reverse Proxy Deep Dive: The Hidden Complexity of Service Discovery

Comments
8 min read
Regulation vs. Responsibility: Where developers must lead

Regulation vs. Responsibility: Where developers must lead

2
Comments
3 min read
Understanding Content Security Policy (CSP) in JavaScript Apps

Understanding Content Security Policy (CSP) in JavaScript Apps

1
Comments
1 min read
Cybersecurity Challenges in South Africa
Cover image for Cybersecurity Challenges in South Africa

Cybersecurity Challenges in South Africa

8
Comments 3
2 min read
Security—The Barrier to Blockchain Adoption.
Cover image for Security—The Barrier to Blockchain Adoption.

Security—The Barrier to Blockchain Adoption.

Comments
4 min read
🤳📍 Your Phone’s Silent Betrayal: What Your Photos Are Revealing
Cover image for 🤳📍 Your Phone’s Silent Betrayal: What Your Photos Are Revealing

🤳📍 Your Phone’s Silent Betrayal: What Your Photos Are Revealing

3
Comments
4 min read
Building an Azure Misconfiguration Scanner: Week 1 of My 90-Day Challenge

Building an Azure Misconfiguration Scanner: Week 1 of My 90-Day Challenge

Comments
2 min read
[rant] Rust: The Safety Language That Still Isn’t Safe Enough

[rant] Rust: The Safety Language That Still Isn’t Safe Enough

1
Comments
2 min read
Why security isn't just an afterthought?
Cover image for Why security isn't just an afterthought?

Why security isn't just an afterthought?

Comments
1 min read
Guide pratique pour sécuriser votre PME contre les cybermenaces

Guide pratique pour sécuriser votre PME contre les cybermenaces

Comments
1 min read
📘 How to Easily Pass the CKS Exam — Real Tips from a Dev
Cover image for 📘 How to Easily Pass the CKS Exam — Real Tips from a Dev

📘 How to Easily Pass the CKS Exam — Real Tips from a Dev

1
Comments 1
2 min read
Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa
Cover image for Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

Exploiting the Gap: How weak Cybersecurity empowers corruption in South Africa

1
Comments
1 min read
What Is Steganography? Hidden Messages in Images Explained

What Is Steganography? Hidden Messages in Images Explained

6
Comments
3 min read
How to configure SSH for accessing remote repositories
Cover image for How to configure SSH for accessing remote repositories

How to configure SSH for accessing remote repositories

2
Comments
5 min read
HackTheSite Basic 5

HackTheSite Basic 5

Comments
1 min read
The Two Generals’ Problem: A Fundamental Communication Paradox
Cover image for The Two Generals’ Problem: A Fundamental Communication Paradox

The Two Generals’ Problem: A Fundamental Communication Paradox

6
Comments
2 min read
Networking Series 5: Testing VPC Connectivity
Cover image for Networking Series 5: Testing VPC Connectivity

Networking Series 5: Testing VPC Connectivity

Comments
3 min read
loading...