Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)
Cover image for Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Building a Tamper-Evident Audit Log with SHA-256 Hash Chains (Zero Dependencies)

Comments
7 min read
JWT Is Not Secure — Until You Understand JWS and JWE
Cover image for JWT Is Not Secure — Until You Understand JWS and JWE

JWT Is Not Secure — Until You Understand JWS and JWE

5
Comments
3 min read
Proxy routing implementation playbook: building two lanes for identity and coverage

Proxy routing implementation playbook: building two lanes for identity and coverage

Comments
6 min read
Building a Zero-Trust Security Gateway for Local AI

Building a Zero-Trust Security Gateway for Local AI

Comments
2 min read
Auth Sessions Should Never Be Transient Across Boundaries

Auth Sessions Should Never Be Transient Across Boundaries

Comments
5 min read
The .env Disaster: Why Your App is a Ticking Time Bomb (and How to Fix It)

The .env Disaster: Why Your App is a Ticking Time Bomb (and How to Fix It)

Comments
2 min read
Digitally Sign Any File in Your Browser: Without Uploading Files or Installing Software — 100% Local, Private, and Secure.

Digitally Sign Any File in Your Browser: Without Uploading Files or Installing Software — 100% Local, Private, and Secure.

1
Comments
2 min read
Want To Be a Hacker? Getting Started with Ethical Hacking (TryHackMe Journey)
Cover image for Want To Be a Hacker? Getting Started with Ethical Hacking (TryHackMe Journey)

Want To Be a Hacker? Getting Started with Ethical Hacking (TryHackMe Journey)

Comments
5 min read
MULTI-CONTAINER SYSTEM + REVERSE PROXY (CONSOLIDATION)
Cover image for MULTI-CONTAINER SYSTEM + REVERSE PROXY (CONSOLIDATION)

MULTI-CONTAINER SYSTEM + REVERSE PROXY (CONSOLIDATION)

Comments
4 min read
Top 10 IaC Tools for DevOps in 2026: Which One Wins for Multi-Cloud? (Terraform, Pulumi, OpenTofu Compared)
Cover image for Top 10 IaC Tools for DevOps in 2026: Which One Wins for Multi-Cloud? (Terraform, Pulumi, OpenTofu Compared)

Top 10 IaC Tools for DevOps in 2026: Which One Wins for Multi-Cloud? (Terraform, Pulumi, OpenTofu Compared)

Comments
3 min read
Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP
Cover image for Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP

Building Tamper-Proof Audit Trails for AI Content Pipelines: A Practical Guide to CAP

Comments
6 min read
Cybersecurity ProxyChains: A Mask of Anonymity

Cybersecurity ProxyChains: A Mask of Anonymity

Comments
3 min read
👤 AWS 116: Who Goes There? - Creating Your First IAM User
Cover image for 👤 AWS 116: Who Goes There? - Creating Your First IAM User

👤 AWS 116: Who Goes There? - Creating Your First IAM User

Comments
3 min read
Building a Security Test Lab with QEMU: From Zero to Network Monitoring
Cover image for Building a Security Test Lab with QEMU: From Zero to Network Monitoring

Building a Security Test Lab with QEMU: From Zero to Network Monitoring

Comments
9 min read
Building a Home SOC Lab

Building a Home SOC Lab

Comments
2 min read
How to Quickly Diagnose Network Issues Using Browser-Based Tools

How to Quickly Diagnose Network Issues Using Browser-Based Tools

Comments
3 min read
Improved Dependency Submission for GitHub Actions
Cover image for Improved Dependency Submission for GitHub Actions

Improved Dependency Submission for GitHub Actions

Comments
3 min read
🔐Automated Security Incident Response System ⚠
Cover image for 🔐Automated Security Incident Response System ⚠

🔐Automated Security Incident Response System ⚠

Comments
21 min read
🚀 Terraform Day 21: Policy & Governance Automation on AWS
Cover image for 🚀 Terraform Day 21: Policy & Governance Automation on AWS

🚀 Terraform Day 21: Policy & Governance Automation on AWS

Comments
2 min read
Hacking Ético

Hacking Ético

Comments
1 min read
JWT vs Cookies in Next.js: What Should We Really Use for Authentication?
Cover image for JWT vs Cookies in Next.js: What Should We Really Use for Authentication?

JWT vs Cookies in Next.js: What Should We Really Use for Authentication?

Comments
3 min read
How I Built an AI Password Automation Tool with browser-use
Cover image for How I Built an AI Password Automation Tool with browser-use

How I Built an AI Password Automation Tool with browser-use

Comments
1 min read
Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene
Cover image for Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene

Kubernetes v1.35 Raises the Cost of Bad Certificate Hygiene

1
Comments
4 min read
Building Secure Cloud Infrastructure -> How AI-Powered IaC Development Revolutionizes Security
Cover image for Building Secure Cloud Infrastructure -> How AI-Powered IaC Development Revolutionizes Security

Building Secure Cloud Infrastructure -> How AI-Powered IaC Development Revolutionizes Security

Comments
9 min read
SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

SENTINEL: The Only Production-Ready Open-Source AI Security Gateway (170 Engines)

Comments
2 min read
loading...