Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🪟 Windows 10 End of Life: What It Means and What You Should Do Now
Cover image for 🪟 Windows 10 End of Life: What It Means and What You Should Do Now

🪟 Windows 10 End of Life: What It Means and What You Should Do Now

1
Comments 1
2 min read
Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

Designing a Cloud Risk Management Program That Keeps Law Firms Compliant and Clients Confident

2
Comments
4 min read
Secure Your APIs with Apache APISIX + SafeLine WAF

Secure Your APIs with Apache APISIX + SafeLine WAF

6
Comments
2 min read
Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

Exposing the Achilles' Heel of Audio Deepfake Detection: A Call to Arms

1
Comments
2 min read
Securing the AI Supply Chain: The Threat Nobody's Talking About
Cover image for Securing the AI Supply Chain: The Threat Nobody's Talking About

Securing the AI Supply Chain: The Threat Nobody's Talking About

Comments 1
8 min read
FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

FlexiSPY and State Surveillance: Technical Lessons from the BBC Kenya Case

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 14, 2025

Outil de Cybersécurité du Jour - Sep 14, 2025

5
Comments
2 min read
Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense
Cover image for Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense

Amazon Braket - Quantum Linguistic Security: Finnish Agglutinative Morphology Meets AI Defense

4
Comments
3 min read
Building AI Systems That Don't Break Under Attack
Cover image for Building AI Systems That Don't Break Under Attack

Building AI Systems That Don't Break Under Attack

1
Comments
7 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Your First Step in Cybersecurity: SOC and Certifications

Your First Step in Cybersecurity: SOC and Certifications

Comments
2 min read
Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery
Cover image for Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

Learning the Hard Way: A New Developer's Tale of AI and Self-Discovery

1
Comments
4 min read
Security Alert: XXE Vulnerability in Weaver e-cology OA

Security Alert: XXE Vulnerability in Weaver e-cology OA

6
Comments
2 min read
Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders
Cover image for Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Risk Assessment Reporting: 6 Ways to Make Your Reports Clear and Actionable for Stakeholders

Comments
3 min read
Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Weekly #41-2025: Dotter, Claude Code, Regex, and Startup Insights

Comments
3 min read
Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications
Cover image for Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

Compliance in Financial Web Apps: How to Build Secure, Trustworthy, and Regulation-Ready Applications

1
Comments
3 min read
Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

Which Open-Source WAF Really Delivers? A Head-to-Head Benchmark

10
Comments
3 min read
The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

The Looming Quantum Computing Threat: Why Everyone Should Be Paying Attention to Post-Quantum Security

1
Comments
4 min read
Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks
Cover image for Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

Strengthening Identity Security: Performing Basic Multifactor Authentication (MFA) Tasks

2
Comments
3 min read
SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

SafeLine WAF: Hands-On With the Free Open Source Web Application Firewall

6
Comments
3 min read
How to Secure Different User Types in Linux: A Guide for IT Teams
Cover image for How to Secure Different User Types in Linux: A Guide for IT Teams

How to Secure Different User Types in Linux: A Guide for IT Teams

1
Comments
5 min read
Blackbird: The AI-Powered OSINT Account Enumeration Tool

Blackbird: The AI-Powered OSINT Account Enumeration Tool

3
Comments
2 min read
Security as Physics: Thinking About Networks Like Energy Systems
Cover image for Security as Physics: Thinking About Networks Like Energy Systems

Security as Physics: Thinking About Networks Like Energy Systems

1
Comments
2 min read
Outil de Cybersécurité du Jour - Sep 7, 2025

Outil de Cybersécurité du Jour - Sep 7, 2025

5
Comments
3 min read
Assinatura Digital em Elixir com Criptografia Assimétrica

Assinatura Digital em Elixir com Criptografia Assimétrica

Comments
4 min read
loading...