Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Navigating the Risks of Third-Party Libraries in Web

Navigating the Risks of Third-Party Libraries in Web

Comments
4 min read
My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023
Cover image for My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

My Perspective on the Latest Improvements in Amazon Inspector from re:Invent 2023

2
Comments
3 min read
DevSecOps 101: What is DevSecOps?
Cover image for DevSecOps 101: What is DevSecOps?

DevSecOps 101: What is DevSecOps?

1
Comments
5 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users
Cover image for Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments 1
2 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk
Cover image for A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
How Zero-Trust Architecture Design Enables Global Business Processes
Cover image for How Zero-Trust Architecture Design Enables Global Business Processes

How Zero-Trust Architecture Design Enables Global Business Processes

5
Comments
11 min read
Empowering Cybersecurity: A Guide to Enhancing Awareness and Resilience

Empowering Cybersecurity: A Guide to Enhancing Awareness and Resilience

Comments
2 min read
Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA
Cover image for Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA

Desarrollo de un algoritmo anti-envenenamiento de sistemas de IA

Comments
4 min read
What is a Supply Chain Attack?

What is a Supply Chain Attack?

Comments
3 min read
Redeemer | HackTheBox Write-up
Cover image for Redeemer | HackTheBox Write-up

Redeemer | HackTheBox Write-up

12
Comments
3 min read
21 Ecommerce Fraud Protection Policies to Implement Now

21 Ecommerce Fraud Protection Policies to Implement Now

Comments
6 min read
What is DDoS attack?
Cover image for What is DDoS attack?

What is DDoS attack?

1
Comments
3 min read
What is Security Breach?
Cover image for What is Security Breach?

What is Security Breach?

1
Comments
2 min read
Join the XposedOrNot Hackathon 2024: Innovate for Internet Safety!
Cover image for Join the XposedOrNot Hackathon 2024: Innovate for Internet Safety!

Join the XposedOrNot Hackathon 2024: Innovate for Internet Safety!

2
Comments
2 min read
Backend Security Risks and Tips on How to Prevent Them
Cover image for Backend Security Risks and Tips on How to Prevent Them

Backend Security Risks and Tips on How to Prevent Them

Comments
4 min read
Front-End Security: Popular Types of Attacks
Cover image for Front-End Security: Popular Types of Attacks

Front-End Security: Popular Types of Attacks

6
Comments 1
5 min read
Dealing With GitHub Password Authentication Deprecation
Cover image for Dealing With GitHub Password Authentication Deprecation

Dealing With GitHub Password Authentication Deprecation

2
Comments
4 min read
How to Implement Basic Access Authentication in Spring Boot
Cover image for How to Implement Basic Access Authentication in Spring Boot

How to Implement Basic Access Authentication in Spring Boot

Comments
6 min read
How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin
Cover image for How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin

How to Implement Custom Token-Based Authentication in Spring Boot and Kotlin

4
Comments
5 min read
Why should you care about the “security.txt” file on your website?
Cover image for Why should you care about the “security.txt” file on your website?

Why should you care about the “security.txt” file on your website?

1
Comments
3 min read
Top 10 CIAM Software Solutions

Top 10 CIAM Software Solutions

1
Comments
10 min read
Linux On The Go (Termux)
Cover image for Linux On The Go (Termux)

Linux On The Go (Termux)

5
Comments 1
2 min read
**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**
Cover image for **Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

**Bridging the Gap: Secure Coding Practices from Shruti Kulkarni's OWASP Talk**

3
Comments 4
2 min read
WebSecurity e a sua importância

WebSecurity e a sua importância

14
Comments 1
5 min read
The Role of OpenAPI in Modern API Security
Cover image for The Role of OpenAPI in Modern API Security

The Role of OpenAPI in Modern API Security

1
Comments
4 min read
loading...