Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Azure AD B2B for external collaboration - Complete Guide
Cover image for Azure AD B2B for external collaboration - Complete Guide

Azure AD B2B for external collaboration - Complete Guide

1
Comments
2 min read
Quick Tip: Managed identities implementation
Cover image for Quick Tip: Managed identities implementation

Quick Tip: Managed identities implementation

1
Comments
1 min read
SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist
Cover image for SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist

SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist

6
Comments 3
1 min read
Stop Blaming AWS Defaults for Your Misconfigurations
Cover image for Stop Blaming AWS Defaults for Your Misconfigurations

Stop Blaming AWS Defaults for Your Misconfigurations

2
Comments
4 min read
Rage GBA Engine on macOS: When Gatekeeper Silently Kills the Launch

Rage GBA Engine on macOS: When Gatekeeper Silently Kills the Launch

Comments
3 min read
What actually gets exploited in penetration tests
Cover image for What actually gets exploited in penetration tests

What actually gets exploited in penetration tests

Comments
2 min read
Designing a Production-Grade API Control Layer

Designing a Production-Grade API Control Layer

Comments
1 min read
Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification
Cover image for Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification

Building a Fake News Kill Chain with VeraSnap and CPP — Full Implementation from Capture to Verification

2
Comments
17 min read
When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving
Cover image for When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving

When AI Agents Trust Each Other: The Multi-Agent Security Problem Nobody's Solving

2
Comments 1
7 min read
Why AI Agents Need Their Own Authorization Protocol (and how we built one)
Cover image for Why AI Agents Need Their Own Authorization Protocol (and how we built one)

Why AI Agents Need Their Own Authorization Protocol (and how we built one)

Comments
6 min read
Building Constant-Time Algorithms: Why It’s Harder Than It Looks
Cover image for Building Constant-Time Algorithms: Why It’s Harder Than It Looks

Building Constant-Time Algorithms: Why It’s Harder Than It Looks

Comments
7 min read
Prompt Worms: How AI Agents Became the New Virus Carriers

Prompt Worms: How AI Agents Became the New Virus Carriers

1
Comments
5 min read
I built an Open-Source CLI that stops your AI terminal from leaking secrets
Cover image for I built an Open-Source CLI that stops your AI terminal from leaking secrets

I built an Open-Source CLI that stops your AI terminal from leaking secrets

Comments
4 min read
Mastering Access Control in Crypto: A Developer’s Guide to Operational Security

Mastering Access Control in Crypto: A Developer’s Guide to Operational Security

Comments
2 min read
Trust Is the Substrate, Not the Feature

Trust Is the Substrate, Not the Feature

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.