Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Do You Have a Website? Are You Worried About Hackers Attacking It?

Do You Have a Website? Are You Worried About Hackers Attacking It?

6
Comments
3 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Deploying Static Files for Website Hosting in SafeLine

Deploying Static Files for Website Hosting in SafeLine

5
Comments
1 min read
Addressing Configuration Issues of SafeLine WAF

Addressing Configuration Issues of SafeLine WAF

17
Comments 1
5 min read
How to Customize the Auth Challenge in SafeLine WAF

How to Customize the Auth Challenge in SafeLine WAF

13
Comments
3 min read
The 6 Best Web Application Firewalls Compared (2024)

The 6 Best Web Application Firewalls Compared (2024)

13
Comments
4 min read
How to Secure Static Resources with Open Source WAF, SafeLine

How to Secure Static Resources with Open Source WAF, SafeLine

11
Comments
1 min read
How to Configure SafeLine WAF to Correctly Obtain the Source IP

How to Configure SafeLine WAF to Correctly Obtain the Source IP

12
Comments
3 min read
WEP Encryption: The Theory Behind Network Security

WEP Encryption: The Theory Behind Network Security

3
Comments
4 min read
DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"

DevOps Fail: "Windows Update Zero-Day Being Exploited to Undo Security Fixes"

Comments
1 min read
Open API Usage Tutorial for Open Source WAF SafeLine

Open API Usage Tutorial for Open Source WAF SafeLine

12
Comments
2 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community
Cover image for OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

1
Comments
7 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
The Significance of Website Hacking

The Significance of Website Hacking

11
Comments
3 min read
How to Set Up a Honeypot for Cyber Attacks

How to Set Up a Honeypot for Cyber Attacks

11
Comments 2
2 min read
Types of Cybersecurity Solutions: Which one is the best for you?
Cover image for Types of Cybersecurity Solutions: Which one is the best for you?

Types of Cybersecurity Solutions: Which one is the best for you?

1
Comments
9 min read
Integrating Cybersecurity into Risk Management: A Comprehensive Guide

Integrating Cybersecurity into Risk Management: A Comprehensive Guide

Comments
6 min read
Top 6 Free and Open Source Cybersecurity Tools for Startups

Top 6 Free and Open Source Cybersecurity Tools for Startups

18
Comments
3 min read
Unleash the Power of Passwords in the DevOps Era
Cover image for Unleash the Power of Passwords in the DevOps Era

Unleash the Power of Passwords in the DevOps Era

7
Comments
6 min read
O Problema da Cibersegurança Atual

O Problema da Cibersegurança Atual

Comments
3 min read
Understanding How an Open Source WAF Monitor HTTP Requests

Understanding How an Open Source WAF Monitor HTTP Requests

11
Comments
2 min read
Demystifying the Technology Architecture of Open Source WAF, SafeLine

Demystifying the Technology Architecture of Open Source WAF, SafeLine

10
Comments
3 min read
Black Hat Asia 2025: What You Need to Know

Black Hat Asia 2025: What You Need to Know

11
Comments
2 min read
How To Get There: Bridging The Technology Gap Preventing You From Adopting A Secrets-free Machine Identity Framework
Cover image for How To Get There: Bridging The Technology Gap Preventing You From Adopting A Secrets-free Machine Identity Framework

How To Get There: Bridging The Technology Gap Preventing You From Adopting A Secrets-free Machine Identity Framework

2
Comments 1
6 min read
Building a Password Strength Checker in Python

Building a Password Strength Checker in Python

12
Comments
3 min read
loading...