Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security
Cover image for AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

Comments
7 min read
AI-Native Threat Detection: Why the Edge is the New Frontline for IDS
Cover image for AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

Comments
7 min read
The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

Comments
4 min read
Next.js 14 Authentication and RBAC with App Router
Cover image for Next.js 14 Authentication and RBAC with App Router

Next.js 14 Authentication and RBAC with App Router

5
Comments
13 min read
Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks
Cover image for Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks

Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks

Comments
7 min read
Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge
Cover image for Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Comments
10 min read
Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs
Cover image for Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs

Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs

Comments
7 min read
Zero Trust at the Edge: Securing Distributed SMB Networks in 2024
Cover image for Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Comments
6 min read
ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

Comments
3 min read
Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

1
Comments
4 min read
Your .env File Might Be Public Right Now
Cover image for Your .env File Might Be Public Right Now

Your .env File Might Be Public Right Now

Comments
4 min read
Home Router Hardening Checklist: 10 Settings to Change Right Now

Home Router Hardening Checklist: 10 Settings to Change Right Now

Comments
4 min read
Why I Stopped Mocking 2FA in Tests (And What I Do Instead)
Cover image for Why I Stopped Mocking 2FA in Tests (And What I Do Instead)

Why I Stopped Mocking 2FA in Tests (And What I Do Instead)

Comments
7 min read
The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months
Cover image for The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months

The Hidden Cost of Phone-Based Auth: What I Learned After 18 Months

Comments
8 min read
Pi-hole Setup Guide: Block Ads and Malware for Every Device on Your Network

Pi-hole Setup Guide: Block Ads and Malware for Every Device on Your Network

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.