Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The New WAF Choice for Developers: SafeLine

The New WAF Choice for Developers: SafeLine

6
Comments
3 min read
Zero Trust Security: Revolutionizing Cyber Defense in 2024
Cover image for Zero Trust Security: Revolutionizing Cyber Defense in 2024

Zero Trust Security: Revolutionizing Cyber Defense in 2024

Comments
3 min read
Nmap Script Engine (NSE) for Network Vulnerability Assessment
Cover image for Nmap Script Engine (NSE) for Network Vulnerability Assessment

Nmap Script Engine (NSE) for Network Vulnerability Assessment

Comments
2 min read
Protect Your Site from Hackers with SafeLine: A Free and Open-Source WAF

Protect Your Site from Hackers with SafeLine: A Free and Open-Source WAF

8
Comments 1
3 min read
CVE-2022-26923 | TryHackMe

CVE-2022-26923 | TryHackMe

7
Comments
2 min read
Google Solves Passkeys' Cross-Platform Issue: Syncing Across Windows, macOS & Android
Cover image for Google Solves Passkeys' Cross-Platform Issue: Syncing Across Windows, macOS & Android

Google Solves Passkeys' Cross-Platform Issue: Syncing Across Windows, macOS & Android

3
Comments
2 min read
My Experience with SafeLine: A Powerful and Free Web Application Firewall

My Experience with SafeLine: A Powerful and Free Web Application Firewall

9
Comments
3 min read
The Curse of Von Neumann Architecture

The Curse of Von Neumann Architecture

Comments
1 min read
SSO Simplified: Enhancing Security and User Experience
Cover image for SSO Simplified: Enhancing Security and User Experience

SSO Simplified: Enhancing Security and User Experience

1
Comments
7 min read
How to Harden IaC Security with KICS

How to Harden IaC Security with KICS

Comments
6 min read
Diffie-Hellman Key Exchange (DHKE) Algorithm

Diffie-Hellman Key Exchange (DHKE) Algorithm

7
Comments 3
3 min read
Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Comments
1 min read
It is easy to create a SOC team,but difficult to maintain it,listen why
Cover image for It is easy to create a SOC team,but difficult to maintain it,listen why

It is easy to create a SOC team,but difficult to maintain it,listen why

1
Comments
4 min read
Desafio Pickle Rick - TryHackMe
Cover image for Desafio Pickle Rick - TryHackMe

Desafio Pickle Rick - TryHackMe

7
Comments 2
7 min read
How to Integrate Passkeys in Python (FastAPI)
Cover image for How to Integrate Passkeys in Python (FastAPI)

How to Integrate Passkeys in Python (FastAPI)

10
Comments
4 min read
Keterampilan dan Pengetahuan Keamanan
Cover image for Keterampilan dan Pengetahuan Keamanan

Keterampilan dan Pengetahuan Keamanan

Comments
3 min read
Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️
Cover image for Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Understanding SQL Injection: A Critical Security Vulnerability🔒⚠️🛡️

Comments
2 min read
Software: Our SOC 2 journey
Cover image for Software: Our SOC 2 journey

Software: Our SOC 2 journey

Comments
4 min read
Building a Secure WordPress Site with Docker, Nginx, and SafeLine WAF

Building a Secure WordPress Site with Docker, Nginx, and SafeLine WAF

8
Comments
2 min read
Top 11 DevOps Security Tools

Top 11 DevOps Security Tools

1
Comments 1
9 min read
[Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀
Cover image for [Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀

[Open Source] 🚀 TRACE: Toolkit for Retrieval and Analysis of Cyber Evidence 🚀

2
Comments
2 min read
SafeLine WAF: Performance Testing and Optimization

SafeLine WAF: Performance Testing and Optimization

6
Comments
4 min read
Our Journey with an Open-Source WAF Solution for Enterprise Security

Our Journey with an Open-Source WAF Solution for Enterprise Security

7
Comments
2 min read
Database Cybersecurity Best Practices & Solutions You Should Know
Cover image for Database Cybersecurity Best Practices & Solutions You Should Know

Database Cybersecurity Best Practices & Solutions You Should Know

Comments
5 min read
Polyfills - a filler or a gaping hole? (Part-2)

Polyfills - a filler or a gaping hole? (Part-2)

Comments
5 min read
loading...