Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Bouncer and the Connector: AWS Guardrails vs. MCP Explained
Cover image for The Bouncer and the Connector: AWS Guardrails vs. MCP Explained

The Bouncer and the Connector: AWS Guardrails vs. MCP Explained

2
Comments 1
3 min read
CES 2026: Why Trust and Security Are the New Frontiers for AI
Cover image for CES 2026: Why Trust and Security Are the New Frontiers for AI

CES 2026: Why Trust and Security Are the New Frontiers for AI

Comments
3 min read
Day 16 — Authentication Between Services (The Dragon-Archer's Question)
Cover image for Day 16 — Authentication Between Services (The Dragon-Archer's Question)

Day 16 — Authentication Between Services (The Dragon-Archer's Question)

3
Comments
2 min read
Shift-left with GitHub Amazon Q Developer Project Rules

Shift-left with GitHub Amazon Q Developer Project Rules

1
Comments
6 min read
Rapg: TUI-based Secret Manager
Cover image for Rapg: TUI-based Secret Manager

Rapg: TUI-based Secret Manager

2
Comments
3 min read
Stop Zipping Folders: How I Built a Zero-Trust Tunnel to Share Files Instantly (in Go)

Stop Zipping Folders: How I Built a Zero-Trust Tunnel to Share Files Instantly (in Go)

13
Comments 5
3 min read
The Gap Between Compliance-Driven Pentesting and Real Security
Cover image for The Gap Between Compliance-Driven Pentesting and Real Security

The Gap Between Compliance-Driven Pentesting and Real Security

2
Comments
5 min read
Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Discovering Hiawatha: A Lightweight Web Server for Modern PHP Deployments

Comments
2 min read
Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command
Cover image for Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Secure your programmatic access to AWS Services using "aws login" - a new AWS CLI command

Comments
3 min read
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps
Cover image for From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

Comments
7 min read
Tutorial: How to Detect VPNs and Tor Users in Node.js Express

Tutorial: How to Detect VPNs and Tor Users in Node.js Express

Comments
3 min read
Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown
Cover image for Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Sha1-Hulud 2.0 - The Second Coming: A Technical Breakdown

Comments
5 min read
Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites
Cover image for Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites

Multi-Site GDPR & CIPA Audit: Fixing Compliance Across 10 Event Websites

Comments
2 min read
How to stop OpenAI API credit draining using Client-Side Proof of Work (Node + React)

How to stop OpenAI API credit draining using Client-Side Proof of Work (Node + React)

2
Comments
2 min read
Create Figma Access Token

Create Figma Access Token

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.