Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

Passkeys vs. Two-Factor Authentication (2FA): Which is Better for Secure User Authentication?

1
Comments
3 min read
Useful Sites for Privacy and Security

Useful Sites for Privacy and Security

Comments
3 min read
Creating a Self Signed Certificate and Verifying the Private Key and Certificate
Cover image for Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Creating a Self Signed Certificate and Verifying the Private Key and Certificate

Comments
3 min read
Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Comments
2 min read
JWT Tokens: Secure Your APIs Like a Pro
Cover image for JWT Tokens: Secure Your APIs Like a Pro

JWT Tokens: Secure Your APIs Like a Pro

3
Comments 3
8 min read
The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

The 7 Dumbest Ways Small Businesses Get Hacked (And How to Avoid Them)

Comments
4 min read
Navigating the Maze: A Guide to Essential Information Security Standards

Navigating the Maze: A Guide to Essential Information Security Standards

Comments
2 min read
How I Use AI Agents Without Compromising Code Quality & Security
Cover image for How I Use AI Agents Without Compromising Code Quality & Security

How I Use AI Agents Without Compromising Code Quality & Security

2
Comments
2 min read
Software Testing - Manual Testing ,Levels,Types

Software Testing - Manual Testing ,Levels,Types

Comments
4 min read
Which LLMs Are (and Aren't) Ready for Secure Code?

Which LLMs Are (and Aren't) Ready for Secure Code?

20
Comments
3 min read
Securing APIs with Two-Factor Authentication
Cover image for Securing APIs with Two-Factor Authentication

Securing APIs with Two-Factor Authentication

Comments
12 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device
Cover image for Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.
Cover image for 🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.

🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.

1
Comments
8 min read
Understanding the SLSA framework
Cover image for Understanding the SLSA framework

Understanding the SLSA framework

Comments
11 min read
🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

Comments
1 min read
Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Comments
3 min read
No Dockerfile? No problem! Running Node and Python MCPs with ToolHive
Cover image for No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

4
Comments
2 min read
How to Use .env Securely in DevOps Projects

How to Use .env Securely in DevOps Projects

6
Comments
2 min read
🔒 Bandit: Python Static Application Security Testing Guide

🔒 Bandit: Python Static Application Security Testing Guide

1
Comments 1
3 min read
🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library
Cover image for 🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

Comments
2 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)
Cover image for Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

14
Comments 3
3 min read
Best DAM Software for Organizing Media on NAS (2025 Guide)

Best DAM Software for Organizing Media on NAS (2025 Guide)

Comments
4 min read
Secrets Management & Zero-Trust Architecture for Web3-Grade Security
Cover image for Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Comments
1 min read
Why can deleted files be recovered?

Why can deleted files be recovered?

Comments
5 min read
loading...