Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Firewalls In Cybersecurity

Understanding Firewalls In Cybersecurity

Comments
3 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Automate AWS Landing Zone Deployment

Automate AWS Landing Zone Deployment

Comments
9 min read
New AWS WAF Feature: Top Insights Visualizations 02:37

New AWS WAF Feature: Top Insights Visualizations

1
Comments
1 min read
Rails GraphQL Auth - JWT, Email & Security

Rails GraphQL Auth - JWT, Email & Security

Comments
4 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

OTP Authentication: The Passwordless Superhero of Your App! 🦸‍♂️✨

Comments
5 min read
Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

6
Comments
2 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
Permission-Based Authentication and Authorization in .NET, via Cookies

Permission-Based Authentication and Authorization in .NET, via Cookies

Comments
13 min read
Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

2
Comments
3 min read
Why is GRC Important in 2025?

Why is GRC Important in 2025?

Comments
3 min read
Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
Secrets Management & Security: Hashicorp Vault

Secrets Management & Security: Hashicorp Vault

Comments
3 min read
Confidence in the cloud with data sovereignty

Confidence in the cloud with data sovereignty

Comments
3 min read
Security news weekly round-up - 3rd January 2025

Security news weekly round-up - 3rd January 2025

1
Comments
3 min read
Malware: Your Ultimate Guide to Protecting Your System!

Malware: Your Ultimate Guide to Protecting Your System!

Comments
2 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
Open Redirects in Laravel: A Critical Guide to Secure Your Application

Open Redirects in Laravel: A Critical Guide to Secure Your Application

2
Comments
3 min read
How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization

How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization

Comments
2 min read
Antivirus in C++

Antivirus in C++

Comments
1 min read
Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

1
Comments
2 min read
How can you secure microservices architecture using AWS services?

How can you secure microservices architecture using AWS services?

1
Comments
2 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
AWS IAM: Access Control compared to how an International Airport works

AWS IAM: Access Control compared to how an International Airport works

Comments
16 min read
Discover Java’s Top 10 Security Features

Discover Java’s Top 10 Security Features

1
Comments 2
4 min read
Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Comments
3 min read
Cybersecurity Understanding the OWASP® Top 10 Security Threats

Cybersecurity Understanding the OWASP® Top 10 Security Threats

Comments
1 min read
MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
I am a wall - Call me a VPC

I am a wall - Call me a VPC

2
Comments 2
3 min read
How to Write Test Cases for OTP Verification

How to Write Test Cases for OTP Verification

Comments
6 min read
Enhance Your App's Security with OTP-Agent

Enhance Your App's Security with OTP-Agent

Comments
2 min read
Securing Your .NET APIs with JWT Authentication

Securing Your .NET APIs with JWT Authentication

1
Comments
2 min read
Buckets? No, S3 buckets

Buckets? No, S3 buckets

Comments
3 min read
Getting Certified: GitHub Advanced Security

Getting Certified: GitHub Advanced Security

1
Comments
4 min read
Configuring AWS Vault with the Pass Backend for Secure Credential Management on Linux

Configuring AWS Vault with the Pass Backend for Secure Credential Management on Linux

Comments
4 min read
Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

Comments
3 min read
6 Essential WebRTC Security Best Practices for 2025

6 Essential WebRTC Security Best Practices for 2025

Comments
6 min read
The Journey of ReqWeb: What’s Coming in Version 2.0

The Journey of ReqWeb: What’s Coming in Version 2.0

Comments
3 min read
Deploy Vaultwarden Password Manager to Dokku Micro PaaS

Deploy Vaultwarden Password Manager to Dokku Micro PaaS

Comments
1 min read
Security news weekly round-up - 27th December 2024

Security news weekly round-up - 27th December 2024

Comments
4 min read
AWS Security - Secure Users

AWS Security - Secure Users

Comments
1 min read
Renew LetsEncrypt SSL Certificate in WordPress by Bitnami

Renew LetsEncrypt SSL Certificate in WordPress by Bitnami

5
Comments
2 min read
Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Comments
39 min read
The Strange Behavior of The Empty Default Privileges on PostgreSQL

The Strange Behavior of The Empty Default Privileges on PostgreSQL

Comments
6 min read
Encryption: ciphers, digests, salt, IV

Encryption: ciphers, digests, salt, IV

Comments
11 min read
Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Comments
5 min read
Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

1
Comments
5 min read
Difference between AWS Security Groups and NACL

Difference between AWS Security Groups and NACL

Comments
4 min read
How to protect your website and hosting from cyberattacks — recommendations and turn-key solutions for project security

How to protect your website and hosting from cyberattacks — recommendations and turn-key solutions for project security

9
Comments
8 min read
Serverless self-service IoT certificate management - Part 2

Serverless self-service IoT certificate management - Part 2

2
Comments
8 min read
Password Composition Policies Are Bad and Here's Why

Password Composition Policies Are Bad and Here's Why

Comments
9 min read
How to Change Your Password Securely

How to Change Your Password Securely

Comments
3 min read
Understanding SSH: Secure Shell Protocol

Understanding SSH: Secure Shell Protocol

Comments
2 min read
Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 2

Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 2

1
Comments
6 min read
Generating SECRET_KEY for production deployment of Django project

Generating SECRET_KEY for production deployment of Django project

Comments
1 min read
⚠️ Modern Scamming Exposed

⚠️ Modern Scamming Exposed

1
Comments
4 min read
loading...