Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Best Cyber Security Certifications for Cloud Security Experts
Cover image for Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Highly Recommended Open-Source WAF: SafeLine

Highly Recommended Open-Source WAF: SafeLine

6
Comments 1
2 min read
Comprehensive Analysis of Attack Events with SafeLine WAF

Comprehensive Analysis of Attack Events with SafeLine WAF

8
Comments
2 min read
Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

6
Comments
2 min read
Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

6
Comments
2 min read
Creating Malware in Python

Creating Malware in Python

3
Comments
1 min read
How to Verify User Accounts in Passkey-Based Systems
Cover image for How to Verify User Accounts in Passkey-Based Systems

How to Verify User Accounts in Passkey-Based Systems

1
Comments
3 min read
TCP/IP Model vs OSI Model: A Detailed Comparison
Cover image for TCP/IP Model vs OSI Model: A Detailed Comparison

TCP/IP Model vs OSI Model: A Detailed Comparison

3
Comments 1
4 min read
Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

7
Comments
2 min read
How AI in CRM enhances Customer Engagement?
Cover image for How AI in CRM enhances Customer Engagement?

How AI in CRM enhances Customer Engagement?

1
Comments
9 min read
Passkey One-Tap Login: The Most Efficient Login
Cover image for Passkey One-Tap Login: The Most Efficient Login

Passkey One-Tap Login: The Most Efficient Login

Comments
2 min read
Social Engineering Attack

Social Engineering Attack

Comments
1 min read
Achieving Multi-WAF Protection and Failover Using SafeLine WAF

Achieving Multi-WAF Protection and Failover Using SafeLine WAF

6
Comments
3 min read
Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture
Cover image for Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Comments
1 min read
Authentication and Authorization: Best Practices for Securing Web Applications
Cover image for Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

3
Comments
4 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus
Cover image for Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Comments
2 min read
How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

5
Comments 1
2 min read
How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

6
Comments
3 min read
SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

10
Comments
3 min read
11.5K Stars! This Web Application Firewall Tool is Incredible!

11.5K Stars! This Web Application Firewall Tool is Incredible!

9
Comments
2 min read
Only 2 papers & 3 assessments to go.

Only 2 papers & 3 assessments to go.

Comments
2 min read
Simple, Easy-to-Use, and Open-Source Web Application Firewall

Simple, Easy-to-Use, and Open-Source Web Application Firewall

7
Comments
2 min read
Insecure Direct Object Reference (IDOR)
Cover image for Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
IR Playbooks TryHackMe

IR Playbooks TryHackMe

8
Comments
3 min read
How to use PwnFox with Burp Suite
Cover image for How to use PwnFox with Burp Suite

How to use PwnFox with Burp Suite

11
Comments
3 min read
loading...