Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Penetration Testing for API Security: Protecting Digital Gateways
Cover image for Penetration Testing for API Security: Protecting Digital Gateways

Penetration Testing for API Security: Protecting Digital Gateways

3
Comments
12 min read
How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

Comments
2 min read
Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

15
Comments
2 min read
2-Factor Authentication OTP: TOTP & HOTP Algorithms
Cover image for 2-Factor Authentication OTP: TOTP & HOTP Algorithms

2-Factor Authentication OTP: TOTP & HOTP Algorithms

Comments
6 min read
MCP Is Rewriting the Rules of API Integration
Cover image for MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

6
Comments
8 min read
Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths
Cover image for Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Comments
1 min read
The Security Crisis: How Tanzu Spring Is Changing the Game
Cover image for The Security Crisis: How Tanzu Spring Is Changing the Game

The Security Crisis: How Tanzu Spring Is Changing the Game

3
Comments
3 min read
The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

Comments
4 min read
Understanding NACLs with AWS EC2 instances 🚀
Cover image for Understanding NACLs with AWS EC2 instances 🚀

Understanding NACLs with AWS EC2 instances 🚀

5
Comments
6 min read
Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes
Cover image for Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

1
Comments
2 min read
Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide
Cover image for Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Comments
3 min read
HashiCorp Vault: Your Friendly Guide to Secret Management 🔐

HashiCorp Vault: Your Friendly Guide to Secret Management 🔐

1
Comments
4 min read
Going Deeper with Keycloak: Understanding Authorization Services
Cover image for Going Deeper with Keycloak: Understanding Authorization Services

Going Deeper with Keycloak: Understanding Authorization Services

4
Comments
6 min read
Defending Your API: Essential Strategies Against Brute Force Attacks
Cover image for Defending Your API: Essential Strategies Against Brute Force Attacks

Defending Your API: Essential Strategies Against Brute Force Attacks

Comments
13 min read
How API Developers Can Use Edge Computing to Optimize API Performance
Cover image for How API Developers Can Use Edge Computing to Optimize API Performance

How API Developers Can Use Edge Computing to Optimize API Performance

Comments
12 min read
Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks
Cover image for Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks

Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks

Comments
12 min read
How To Secure APIs from SQL Injection Vulnerabilities
Cover image for How To Secure APIs from SQL Injection Vulnerabilities

How To Secure APIs from SQL Injection Vulnerabilities

Comments
13 min read
Protecting Sensitive Data in API Logs
Cover image for Protecting Sensitive Data in API Logs

Protecting Sensitive Data in API Logs

Comments
9 min read
Token Expiry Best Practices
Cover image for Token Expiry Best Practices

Token Expiry Best Practices

Comments
6 min read
Session Hijacking In the API Era: Your Complete Defense Strategy
Cover image for Session Hijacking In the API Era: Your Complete Defense Strategy

Session Hijacking In the API Era: Your Complete Defense Strategy

Comments
11 min read
10 Game-Changing Strategies to Supercharge Your API Gateway Performance
Cover image for 10 Game-Changing Strategies to Supercharge Your API Gateway Performance

10 Game-Changing Strategies to Supercharge Your API Gateway Performance

Comments
12 min read
🦅 Falco: Must-know for CKS exam
Cover image for 🦅 Falco: Must-know for CKS exam

🦅 Falco: Must-know for CKS exam

2
Comments
4 min read
Zero Trust API Security: Never Trust, Always Protect
Cover image for Zero Trust API Security: Never Trust, Always Protect

Zero Trust API Security: Never Trust, Always Protect

Comments
10 min read
RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM
Cover image for RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

3
Comments 1
6 min read
Protecting Your APIs from Insider Threats: The Access Control Playbook
Cover image for Protecting Your APIs from Insider Threats: The Access Control Playbook

Protecting Your APIs from Insider Threats: The Access Control Playbook

Comments
10 min read
loading...