Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OAuth2, JWT, and JWKS: Using Amazon Cognito as IdP

OAuth2, JWT, and JWKS: Using Amazon Cognito as IdP

1
Comments
10 min read
🚀 Unlocking Fine-Grained Access Control with Cerbos
Cover image for 🚀 Unlocking Fine-Grained Access Control with Cerbos

🚀 Unlocking Fine-Grained Access Control with Cerbos

35
Comments 4
6 min read
Supercharging AI Projects with Docwire SDK: The Developer's Edge

Supercharging AI Projects with Docwire SDK: The Developer's Edge

Comments
5 min read
Securing PHP Web Applications: Hands-On Practices
Cover image for Securing PHP Web Applications: Hands-On Practices

Securing PHP Web Applications: Hands-On Practices

3
Comments
2 min read
Mastering Cybersecurity: Essential Tips for Developers to Protect Your Applications
Cover image for Mastering Cybersecurity: Essential Tips for Developers to Protect Your Applications

Mastering Cybersecurity: Essential Tips for Developers to Protect Your Applications

2
Comments
3 min read
The Importance of Web Application Firewall defending against Cyber Threats.
Cover image for The Importance of Web Application Firewall defending against Cyber Threats.

The Importance of Web Application Firewall defending against Cyber Threats.

Comments
2 min read
Prevent Sensitive Data Exposure in Laravel: Best Practices
Cover image for Prevent Sensitive Data Exposure in Laravel: Best Practices

Prevent Sensitive Data Exposure in Laravel: Best Practices

Comments
3 min read
6 Steps to Run API Automation Testing

6 Steps to Run API Automation Testing

1
Comments
6 min read
Boost Your Cybersecurity: Easy Guide to the Rust IP Port Sniffer!
Cover image for Boost Your Cybersecurity: Easy Guide to the Rust IP Port Sniffer!

Boost Your Cybersecurity: Easy Guide to the Rust IP Port Sniffer!

Comments
3 min read
🛡️ Cybersecurity for Developers: Protecting Your Code and Systems
Cover image for 🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

Comments
2 min read
Securing Your Node.js Application: A Comprehensive Guide
Cover image for Securing Your Node.js Application: A Comprehensive Guide

Securing Your Node.js Application: A Comprehensive Guide

5
Comments
11 min read
How Semantic Analysis Works in SafeLine WAF

How Semantic Analysis Works in SafeLine WAF

Comments
2 min read
CompTIA Certification Path in 2025 : Your Guide to a Successful IT Career
Cover image for CompTIA Certification Path in 2025 : Your Guide to a Successful IT Career

CompTIA Certification Path in 2025 : Your Guide to a Successful IT Career

8
Comments 4
2 min read
Visual Studio package security
Cover image for Visual Studio package security

Visual Studio package security

2
Comments
4 min read
Apa itu Damn Vulnerable Web Application (DVWA) ?

Apa itu Damn Vulnerable Web Application (DVWA) ?

Comments
3 min read
How to utilize Nmap script categories for vulnerability assessment in Cybersecurity?
Cover image for How to utilize Nmap script categories for vulnerability assessment in Cybersecurity?

How to utilize Nmap script categories for vulnerability assessment in Cybersecurity?

1
Comments
5 min read
Essential Linux Security Practices for DevSecOps Success
Cover image for Essential Linux Security Practices for DevSecOps Success

Essential Linux Security Practices for DevSecOps Success

2
Comments
2 min read
Cybersecurity Basics: A Beginner's Guide
Cover image for Cybersecurity Basics: A Beginner's Guide

Cybersecurity Basics: A Beginner's Guide

7
Comments 2
4 min read
How to Effectively Assess the Security of Your Apps
Cover image for How to Effectively Assess the Security of Your Apps

How to Effectively Assess the Security of Your Apps

6
Comments
5 min read
File Upload Vulnerabilities

File Upload Vulnerabilities

1
Comments
2 min read
The Intersection of Data Science and Cybersecurity
Cover image for The Intersection of Data Science and Cybersecurity

The Intersection of Data Science and Cybersecurity

4
Comments
3 min read
A walkthrough to Sofia Santos' OSINT Exercise #002
Cover image for A walkthrough to Sofia Santos' OSINT Exercise #002

A walkthrough to Sofia Santos' OSINT Exercise #002

Comments
2 min read
Top-Tier DSPM Tools 2024: A Buyer’s Guide to 8 Leading Solutions
Cover image for Top-Tier DSPM Tools 2024: A Buyer’s Guide to 8 Leading Solutions

Top-Tier DSPM Tools 2024: A Buyer’s Guide to 8 Leading Solutions

Comments
5 min read
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
How to Set Up a High Availability Environment with Two SafeLine

How to Set Up a High Availability Environment with Two SafeLine

5
Comments
2 min read
loading...