Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Applications to Find My Calling
Cover image for From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Applications to Find My Calling

From Animation to Cybersecurity & AI: How I Battled Self-Doubt, and 225 Job Applications to Find My Calling

Comments
6 min read
Finding Private Information Through Resumes on Google Search

Finding Private Information Through Resumes on Google Search

Comments
3 min read
Camouflage-Shield: An Image Encryption Application.
Cover image for Camouflage-Shield: An Image Encryption Application.

Camouflage-Shield: An Image Encryption Application.

6
Comments
4 min read
Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime
Cover image for Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Identifying Social Engineering Scams: Understanding the Modern Face of Cybercrime

Comments
2 min read
The Book Nook: A Website Security Crisis

The Book Nook: A Website Security Crisis

12
Comments
3 min read
How Minecraft Hypixel Scammers Are Getting Away With Your Accounts
Cover image for How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

2
Comments
5 min read
Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

Why You Need This Decade-Old Open-Source WAF for Ultimate Web Protection

5
Comments
2 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification
Cover image for 7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments 1
3 min read
Implementing Network Security: A Guide to Modern Methodologies
Cover image for Implementing Network Security: A Guide to Modern Methodologies

Implementing Network Security: A Guide to Modern Methodologies

11
Comments 1
5 min read
Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

1
Comments
3 min read
Automated Security Operations with Safeline WAF (Part 2)

Automated Security Operations with Safeline WAF (Part 2)

10
Comments
5 min read
How to Set Up SSL Protocols and Cipher Suites with SafeLine WAF

How to Set Up SSL Protocols and Cipher Suites with SafeLine WAF

5
Comments
2 min read
The Hidden Key: A Tale of Access Control

The Hidden Key: A Tale of Access Control

11
Comments
3 min read
Automated Security Operations with Safeline WAF (Part 1)

Automated Security Operations with Safeline WAF (Part 1)

10
Comments
4 min read
Guide to SafeLine Open API: Secure Your Access with API Tokens

Guide to SafeLine Open API: Secure Your Access with API Tokens

5
Comments
2 min read
Kong API Gateway x SafeLine, an Open Source WAF

Kong API Gateway x SafeLine, an Open Source WAF

11
Comments
2 min read
Configuring the SSL protocol for Open Source SafeLine WAF

Configuring the SSL protocol for Open Source SafeLine WAF

9
Comments
2 min read
Do You Have a Website? Are You Worried About Hackers Attacking It?

Do You Have a Website? Are You Worried About Hackers Attacking It?

6
Comments
3 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Deploying Static Files for Website Hosting in SafeLine

Deploying Static Files for Website Hosting in SafeLine

5
Comments
1 min read
Addressing Configuration Issues of SafeLine WAF

Addressing Configuration Issues of SafeLine WAF

17
Comments 1
5 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
The 6 Best Web Application Firewalls Compared (2024)

The 6 Best Web Application Firewalls Compared (2024)

13
Comments
4 min read
How to Secure Static Resources with Open Source WAF, SafeLine

How to Secure Static Resources with Open Source WAF, SafeLine

11
Comments
1 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

12
Comments
3 min read
loading...