Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
MCP Is Rewriting the Rules of API Integration
Cover image for MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

6
Comments
8 min read
The Security Crisis: How Tanzu Spring Is Changing the Game
Cover image for The Security Crisis: How Tanzu Spring Is Changing the Game

The Security Crisis: How Tanzu Spring Is Changing the Game

3
Comments
3 min read
Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths
Cover image for Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Comments
1 min read
The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

Comments
4 min read
Understanding NACLs with AWS EC2 instances 🚀
Cover image for Understanding NACLs with AWS EC2 instances 🚀

Understanding NACLs with AWS EC2 instances 🚀

5
Comments
6 min read
Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes
Cover image for Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

1
Comments
2 min read
Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide
Cover image for Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Comments
3 min read
HashiCorp Vault: Your Friendly Guide to Secret Management 🔐

HashiCorp Vault: Your Friendly Guide to Secret Management 🔐

1
Comments
4 min read
Going Deeper with Keycloak: Understanding Authorization Services
Cover image for Going Deeper with Keycloak: Understanding Authorization Services

Going Deeper with Keycloak: Understanding Authorization Services

4
Comments
6 min read
Session Hijacking In the API Era: Your Complete Defense Strategy
Cover image for Session Hijacking In the API Era: Your Complete Defense Strategy

Session Hijacking In the API Era: Your Complete Defense Strategy

Comments
11 min read
10 Game-Changing Strategies to Supercharge Your API Gateway Performance
Cover image for 10 Game-Changing Strategies to Supercharge Your API Gateway Performance

10 Game-Changing Strategies to Supercharge Your API Gateway Performance

Comments
12 min read
How To Secure APIs from SQL Injection Vulnerabilities
Cover image for How To Secure APIs from SQL Injection Vulnerabilities

How To Secure APIs from SQL Injection Vulnerabilities

Comments
13 min read
How API Developers Can Use Edge Computing to Optimize API Performance
Cover image for How API Developers Can Use Edge Computing to Optimize API Performance

How API Developers Can Use Edge Computing to Optimize API Performance

Comments
12 min read
Token Expiry Best Practices
Cover image for Token Expiry Best Practices

Token Expiry Best Practices

Comments
6 min read
Protecting Sensitive Data in API Logs
Cover image for Protecting Sensitive Data in API Logs

Protecting Sensitive Data in API Logs

Comments
9 min read
Defending Your API: Essential Strategies Against Brute Force Attacks
Cover image for Defending Your API: Essential Strategies Against Brute Force Attacks

Defending Your API: Essential Strategies Against Brute Force Attacks

Comments
13 min read
Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks
Cover image for Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks

Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks

Comments
12 min read
🦅 Falco: Must-know for CKS exam
Cover image for 🦅 Falco: Must-know for CKS exam

🦅 Falco: Must-know for CKS exam

2
Comments
4 min read
RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM
Cover image for RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

3
Comments 1
6 min read
Zero Trust API Security: Never Trust, Always Protect
Cover image for Zero Trust API Security: Never Trust, Always Protect

Zero Trust API Security: Never Trust, Always Protect

Comments
10 min read
Protecting Your APIs from Insider Threats: The Access Control Playbook
Cover image for Protecting Your APIs from Insider Threats: The Access Control Playbook

Protecting Your APIs from Insider Threats: The Access Control Playbook

Comments
10 min read
Vibe Coding with AI? Don't Forget These Security Fundamentals

Vibe Coding with AI? Don't Forget These Security Fundamentals

1
Comments
2 min read
🔐 I Built a JavaScript Web Vulnerability Scanner Devs Can Actually Use (CLI, Web UI, and AI-Powered Fixes)

🔐 I Built a JavaScript Web Vulnerability Scanner Devs Can Actually Use (CLI, Web UI, and AI-Powered Fixes)

1
Comments 1
2 min read
Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

19
Comments
3 min read
If You Can't Control Access, You Can't Control the Cloud (Part 1)
Cover image for If You Can't Control Access, You Can't Control the Cloud (Part 1)

If You Can't Control Access, You Can't Control the Cloud (Part 1)

3
Comments 1
6 min read
loading...