Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Deploy SafeLine WAF on Ubuntu

How to Deploy SafeLine WAF on Ubuntu

9
Comments
2 min read
Web Application Firewall
Cover image for Web Application Firewall

Web Application Firewall

10
Comments
4 min read
Top 5 Website Data Leakage Events 2024

Top 5 Website Data Leakage Events 2024

2
Comments
2 min read
Secure Coding - Prevention Over Correction.
Cover image for Secure Coding - Prevention Over Correction.

Secure Coding - Prevention Over Correction.

15
Comments
12 min read
Hi, I'm Dan!
Cover image for Hi, I'm Dan!

Hi, I'm Dan!

1
Comments
1 min read
SafeLine WAF: How to Protect Your Website Dynamically

SafeLine WAF: How to Protect Your Website Dynamically

16
Comments
3 min read
What is Dynamic Protection in SafeLine WAF
Cover image for What is Dynamic Protection in SafeLine WAF

What is Dynamic Protection in SafeLine WAF

5
Comments
2 min read
Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago
Cover image for Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

1
Comments
6 min read
Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

6
Comments
2 min read
5 Use Cases for Using Open Policy Agent

5 Use Cases for Using Open Policy Agent

Comments
7 min read
AI against Daunting Security: The Future of Self-Rule Hacking

AI against Daunting Security: The Future of Self-Rule Hacking

5
Comments
1 min read
What is a subnet? | How subnetting works
Cover image for What is a subnet? | How subnetting works

What is a subnet? | How subnetting works

4
Comments
7 min read
Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados
Cover image for Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

2
Comments
15 min read
# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero
Cover image for # Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero

# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero

Comments
5 min read
How to Run Open Source WAF SafeLine on K8s

How to Run Open Source WAF SafeLine on K8s

14
Comments
4 min read
Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

17
Comments
4 min read
Why You Need to Protect Your Website and How

Why You Need to Protect Your Website and How

6
Comments
3 min read
Update / Delete Passkeys via WebAuthn Signal API
Cover image for Update / Delete Passkeys via WebAuthn Signal API

Update / Delete Passkeys via WebAuthn Signal API

1
Comments
3 min read
Discover What's New in SafeLine 6.8.0

Discover What's New in SafeLine 6.8.0

5
Comments
1 min read
Why is HTTP not secure? | HTTP vs. HTTPS
Cover image for Why is HTTP not secure? | HTTP vs. HTTPS

Why is HTTP not secure? | HTTP vs. HTTPS

5
Comments
3 min read
Dealing with Frontend Security Issues

Dealing with Frontend Security Issues

Comments
4 min read
Mastering Code: Why Programming is Indispensable in Cybersecurity

Mastering Code: Why Programming is Indispensable in Cybersecurity

1
Comments 1
1 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

6
Comments
2 min read
Network Security Enforcement and Best Practices.
Cover image for Network Security Enforcement and Best Practices.

Network Security Enforcement and Best Practices.

1
Comments
4 min read
Using Open Source WAF to Address Crawlers Occupying Significant Network Bandwidth

Using Open Source WAF to Address Crawlers Occupying Significant Network Bandwidth

6
Comments
3 min read
loading...