Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Step-by-Step Guide to Setting OIDC With Terraform for GitHub Actions Workflows with AWS
Cover image for Step-by-Step Guide to Setting OIDC With Terraform for GitHub Actions Workflows with AWS

Step-by-Step Guide to Setting OIDC With Terraform for GitHub Actions Workflows with AWS

6
Comments 1
8 min read
SRP Demystified: Strengthening Authentication in the Digital Age

SRP Demystified: Strengthening Authentication in the Digital Age

Comments
4 min read
DevSecOps & Scale: Docker, Security, and System Design

DevSecOps & Scale: Docker, Security, and System Design

Comments
2 min read
Mastering DevSecOps and GitOps for Secure Cloud-Native Applications

Mastering DevSecOps and GitOps for Secure Cloud-Native Applications

Comments 1
6 min read
Salesforce Security Best Practices for Admins in 2025

Salesforce Security Best Practices for Admins in 2025

Comments
1 min read
How C2PA Could Certify AI-Generated Texts (and Why Education Needs It)
Cover image for How C2PA Could Certify AI-Generated Texts (and Why Education Needs It)

How C2PA Could Certify AI-Generated Texts (and Why Education Needs It)

Comments
2 min read
Secure Note Manager in React – Part 1: Cryptography with Web Crypto API

Secure Note Manager in React – Part 1: Cryptography with Web Crypto API

2
Comments
6 min read
From Software to Sustainability: Can Tech Save the Planet?
Cover image for From Software to Sustainability: Can Tech Save the Planet?

From Software to Sustainability: Can Tech Save the Planet?

Comments
5 min read
The Future of AI Isn’t Coming ,It’s Already in Your Inbox
Cover image for The Future of AI Isn’t Coming ,It’s Already in Your Inbox

The Future of AI Isn’t Coming ,It’s Already in Your Inbox

Comments
5 min read
Debugging SAML Response XML: A Step-by-Step Guide

Debugging SAML Response XML: A Step-by-Step Guide

Comments 1
2 min read
DevSecOps: How I Made Our Desktop App Updates Safe
Cover image for DevSecOps: How I Made Our Desktop App Updates Safe

DevSecOps: How I Made Our Desktop App Updates Safe

2
Comments
4 min read
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments 1
3 min read
The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have
Cover image for The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

The Digital Backbone: Why ISO 27001 is a Must-Have, Not a Nice-to-Have

Comments
5 min read
I Made NR34P3R: Fast Multi-Threaded Port Scanner for Detecting Open Ports & Services

I Made NR34P3R: Fast Multi-Threaded Port Scanner for Detecting Open Ports & Services

Comments
2 min read
I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

I Made CR4SH3R: Tool for Automating Vulnerability Detection in WordPress Plugins

Comments
2 min read
When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

When the CDN Blinks: Endpoint Obfuscation, TTL Conflict, and Behavioral Web Architecture

Comments
3 min read
🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

🔐 Secure Auth Token Handling in the Frontend: When Your Client Needs the Token

12
Comments 2
3 min read
Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Comments 1
5 min read
Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Comments
4 min read
AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking
Cover image for AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

AI Code Assistant Memories, PHP Reachability, CVE Policies, and Benchmarking

1
Comments 1
4 min read
Introduction to IAM in Oracle Cloud Infrastructure
Cover image for Introduction to IAM in Oracle Cloud Infrastructure

Introduction to IAM in Oracle Cloud Infrastructure

6
Comments 2
3 min read
The Ultimate Guide to SSH Hardening: Secure Your Remote Access
Cover image for The Ultimate Guide to SSH Hardening: Secure Your Remote Access

The Ultimate Guide to SSH Hardening: Secure Your Remote Access

1
Comments
4 min read
Security news weekly round-up - 20th June 2025
Cover image for Security news weekly round-up - 20th June 2025

Security news weekly round-up - 20th June 2025

1
Comments
5 min read
How to Prevent Phishing Attacks: A Technical Implementation Guide
Cover image for How to Prevent Phishing Attacks: A Technical Implementation Guide

How to Prevent Phishing Attacks: A Technical Implementation Guide

Comments
2 min read
VPC Traffic Flow and Security
Cover image for VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
loading...