Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Zero Trust Architecture: Why “Trust No One” Is the Future of Security 🔐
Cover image for Zero Trust Architecture: Why “Trust No One” Is the Future of Security 🔐

Zero Trust Architecture: Why “Trust No One” Is the Future of Security 🔐

Comments
3 min read
How to practice Security Code Reviews
Cover image for How to practice Security Code Reviews

How to practice Security Code Reviews

1
Comments
2 min read
Praktikum Keamanan Web: Open Redirect Vulnerability 🔀🎣
Cover image for Praktikum Keamanan Web: Open Redirect Vulnerability 🔀🎣

Praktikum Keamanan Web: Open Redirect Vulnerability 🔀🎣

Comments
3 min read
Pen Testing IoT Devices

Pen Testing IoT Devices

Comments
8 min read
Praktikum Keamanan Web: File Upload Vulnerability 😱📁💥
Cover image for Praktikum Keamanan Web: File Upload Vulnerability 😱📁💥

Praktikum Keamanan Web: File Upload Vulnerability 😱📁💥

Comments
3 min read
VAP: A Universal Framework for AI Flight Recorders

VAP: A Universal Framework for AI Flight Recorders

Comments
6 min read
Amazon Athena in the AWS Periodic Table
Cover image for Amazon Athena in the AWS Periodic Table

Amazon Athena in the AWS Periodic Table

Comments
2 min read
Beafing up Your server For Production🐄
Cover image for Beafing up Your server For Production🐄

Beafing up Your server For Production🐄

Comments
4 min read
npm Security 2025: Why Provenance and Sigstore Change Everything

npm Security 2025: Why Provenance and Sigstore Change Everything

Comments
11 min read
Security news weekly round-up - 19th December 2025
Cover image for Security news weekly round-up - 19th December 2025

Security news weekly round-up - 19th December 2025

1
Comments
3 min read
IAP-FIN: Building AI Audit Trails That Actually Satisfy Financial Regulators

IAP-FIN: Building AI Audit Trails That Actually Satisfy Financial Regulators

Comments
10 min read
How a $200 Receiver Led Me Down a Bluetooth Protocol Reverse Engineering Rabbit Hole

How a $200 Receiver Led Me Down a Bluetooth Protocol Reverse Engineering Rabbit Hole

Comments
2 min read
Smart Escrow Series #3: Security
Cover image for Smart Escrow Series #3: Security

Smart Escrow Series #3: Security

Comments
3 min read
Container Image Vulnerability Scanning Using Grype
Cover image for Container Image Vulnerability Scanning Using Grype

Container Image Vulnerability Scanning Using Grype

Comments
2 min read
Security in IRIS

Security in IRIS

Comments
20 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.