Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide
Cover image for Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Comments
1 min read
5-Layer Windows Registry Anomaly Detection Using Python

5-Layer Windows Registry Anomaly Detection Using Python

Comments
1 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

1
Comments
3 min read
Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Comments
2 min read
Why Developers Seek an Auth0 Alternative

Why Developers Seek an Auth0 Alternative

Comments
2 min read
AWS re:Inforce 2025 keynote highlights
Cover image for AWS re:Inforce 2025 keynote highlights

AWS re:Inforce 2025 keynote highlights

5
Comments
9 min read
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale
Cover image for RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

Comments
10 min read
The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

Comments 1
4 min read
Most Valuable When Least Visible | The Security Paradox

Most Valuable When Least Visible | The Security Paradox

Comments
3 min read
Face Recognition for Crypto: Enhancing Security and Trust
Cover image for Face Recognition for Crypto: Enhancing Security and Trust

Face Recognition for Crypto: Enhancing Security and Trust

Comments
1 min read
Java Microservices on Kubernetes: A Step-by-Step Guide

Java Microservices on Kubernetes: A Step-by-Step Guide

Comments
1 min read
🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

5
Comments 2
3 min read
Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Comments
2 min read
Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

1
Comments
8 min read
How to Effectively Vet Your Supply Chain for Optimal Performance
Cover image for How to Effectively Vet Your Supply Chain for Optimal Performance

How to Effectively Vet Your Supply Chain for Optimal Performance

5
Comments
4 min read
Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

4
Comments
3 min read
Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Comments
6 min read
Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Comments
2 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet
Cover image for The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

Comments 1
4 min read
Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects
Cover image for Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

2
Comments
6 min read
K3S pods connected from external systems without any service load balancer configured

K3S pods connected from external systems without any service load balancer configured

Comments 1
1 min read
How to Buy the Right SSL Certificate Without Overspending
Cover image for How to Buy the Right SSL Certificate Without Overspending

How to Buy the Right SSL Certificate Without Overspending

1
Comments 1
3 min read
Working with API Rate Limits: Lessons from Developer Mistakes
Cover image for Working with API Rate Limits: Lessons from Developer Mistakes

Working with API Rate Limits: Lessons from Developer Mistakes

Comments
4 min read
Kali Linux Users Account Management.
Cover image for Kali Linux Users Account Management.

Kali Linux Users Account Management.

1
Comments
19 min read
I Tested hcef: A Native C++ Encryption Module for Node.js That Deserves More Attention

I Tested hcef: A Native C++ Encryption Module for Node.js That Deserves More Attention

Comments
2 min read
loading...