Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How I Manage My SSH Keys Across Multiple Servers and GitHub

How I Manage My SSH Keys Across Multiple Servers and GitHub

Comments
3 min read
Self-Host n8n with Cloudflare Zero Trust and Docker

Self-Host n8n with Cloudflare Zero Trust and Docker

Comments
5 min read
How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

How we built zero-knowledge end-to-end encryption for a mobile AI coding agent companion

Comments
12 min read
AI-Native Threat Detection: Why the Edge is the New Frontline for IDS
Cover image for AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

AI-Native Threat Detection: Why the Edge is the New Frontline for IDS

Comments
7 min read
AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security
Cover image for AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

AI-Native IDS: Deploying NAPSE on Raspberry Pi for Edge Security

Comments
7 min read
Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)

Comments
2 min read
Next.js 14 Authentication and RBAC with App Router
Cover image for Next.js 14 Authentication and RBAC with App Router

Next.js 14 Authentication and RBAC with App Router

5
Comments
13 min read
The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

The axios Supply Chain Attack Just Proved Why Static Analysis Matters More Than Ever

Comments
4 min read
Zero Trust at the Edge: Securing Distributed SMB Networks in 2024
Cover image for Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Zero Trust at the Edge: Securing Distributed SMB Networks in 2024

Comments
6 min read
Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge
Cover image for Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Implementing Zero Trust Architecture for Unmanaged IoT at the Network Edge

Comments
10 min read
Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs
Cover image for Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs

Transforming Raspberry Pi into an AI-Native Edge IDS for SMBs

Comments
7 min read
Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks
Cover image for Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks

Implementing Zero Trust Architecture in IoT-Heavy Enterprise Networks

Comments
7 min read
ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

ClawHavoc and the Missing Layer: Why Scanning Agent Skills Isn't Enough

Comments
3 min read
Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

Why Cyber-Insurance and SOC 2 Audits Struggle with Small Tech Teams — And What a Structured Evidence Layer Changes

1
Comments
4 min read
Your .env File Might Be Public Right Now
Cover image for Your .env File Might Be Public Right Now

Your .env File Might Be Public Right Now

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.