Forem

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Tutorial: Implement Authentication in Next.js
Cover image for Tutorial: Implement Authentication in Next.js

Tutorial: Implement Authentication in Next.js

1
Comments
43 min read
Four Common Deployment Modes of WAF
Cover image for Four Common Deployment Modes of WAF

Four Common Deployment Modes of WAF

5
Comments
4 min read
Five Free WAF Performance Comparison
Cover image for Five Free WAF Performance Comparison

Five Free WAF Performance Comparison

3
Comments
4 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)
Cover image for A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
What is Responsible AI?

What is Responsible AI?

1
Comments
11 min read
First Impressions of SafeLine: The Most Starred Open-Source WAF on GitHub

First Impressions of SafeLine: The Most Starred Open-Source WAF on GitHub

5
Comments
3 min read
Testing Authorization with Auth Analyzer in Burp Suite
Cover image for Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

8
Comments
5 min read
How AI and Security are intertwined in todays tech world.

How AI and Security are intertwined in todays tech world.

1
Comments
3 min read
Best Cyber Security Certifications for Cloud Security Experts
Cover image for Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Highly Recommended Open-Source WAF: SafeLine

Highly Recommended Open-Source WAF: SafeLine

6
Comments 1
2 min read
Comprehensive Analysis of Attack Events with SafeLine WAF

Comprehensive Analysis of Attack Events with SafeLine WAF

8
Comments
2 min read
Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

Enjoy Enterprise-Level Security for Free with SafeLine Community Edition

6
Comments
2 min read
Creating Malware in Python

Creating Malware in Python

3
Comments
1 min read
Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

Deep Dive into Traffic Scrubbing: Protect Your Network with SafeLine

6
Comments
2 min read
How to Verify User Accounts in Passkey-Based Systems
Cover image for How to Verify User Accounts in Passkey-Based Systems

How to Verify User Accounts in Passkey-Based Systems

1
Comments
3 min read
TCP/IP Model vs OSI Model: A Detailed Comparison
Cover image for TCP/IP Model vs OSI Model: A Detailed Comparison

TCP/IP Model vs OSI Model: A Detailed Comparison

3
Comments 1
4 min read
Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

Protect Your Website Like a Pro: SafeLine, the Open-Source WAF

7
Comments
2 min read
How AI in CRM enhances Customer Engagement?
Cover image for How AI in CRM enhances Customer Engagement?

How AI in CRM enhances Customer Engagement?

1
Comments
9 min read
Passkey One-Tap Login: The Most Efficient Login
Cover image for Passkey One-Tap Login: The Most Efficient Login

Passkey One-Tap Login: The Most Efficient Login

Comments
2 min read
Social Engineering Attack

Social Engineering Attack

Comments
1 min read
Achieving Multi-WAF Protection and Failover Using SafeLine WAF

Achieving Multi-WAF Protection and Failover Using SafeLine WAF

6
Comments
3 min read
Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture
Cover image for Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Building a Secure Future: the Ethical Imperative of Prioritizing Security in Digital Architecture

Comments
1 min read
Authentication and Authorization: Best Practices for Securing Web Applications
Cover image for Authentication and Authorization: Best Practices for Securing Web Applications

Authentication and Authorization: Best Practices for Securing Web Applications

3
Comments
4 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus
Cover image for Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Comments
2 min read
How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

How to Configure and Use SafeLine's Syslog for Real-Time Attack Logging

5
Comments 1
2 min read
loading...