Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy
Cover image for "Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

4
Comments 2
5 min read
Demystifying Authentication in Spring Security
Cover image for Demystifying Authentication in Spring Security

Demystifying Authentication in Spring Security

2
Comments
16 min read
Trust But Verify: Evaluating Security When Choosing Data Infrastructure Tools
Cover image for Trust But Verify: Evaluating Security When Choosing Data Infrastructure Tools

Trust But Verify: Evaluating Security When Choosing Data Infrastructure Tools

Comments
8 min read
GPG for Noobs
Cover image for GPG for Noobs

GPG for Noobs

9
Comments 7
5 min read
5 Secure Ways to Connect to EC2 Instances — Including SSH Key Recovery Made Easy!
Cover image for 5 Secure Ways to Connect to EC2 Instances — Including SSH Key Recovery Made Easy!

5 Secure Ways to Connect to EC2 Instances — Including SSH Key Recovery Made Easy!

9
Comments 3
3 min read
Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs
Cover image for Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs

Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs

1
Comments
3 min read
30 Day SOC Challenge -Day 7

30 Day SOC Challenge -Day 7

Comments
1 min read
A2A vs. MCP: Data Security Woes and a Subtle Fix
Cover image for A2A vs. MCP: Data Security Woes and a Subtle Fix

A2A vs. MCP: Data Security Woes and a Subtle Fix

1
Comments
4 min read
The Billion Laughs Bomb
Cover image for The Billion Laughs Bomb

The Billion Laughs Bomb

4
Comments
3 min read
How to Set Up a Secure Reverse Proxy with Nginx and Let's Encrypt
Cover image for How to Set Up a Secure Reverse Proxy with Nginx and Let's Encrypt

How to Set Up a Secure Reverse Proxy with Nginx and Let's Encrypt

3
Comments
2 min read
Active Directory Domain Services (Part 1)
Cover image for Active Directory Domain Services (Part 1)

Active Directory Domain Services (Part 1)

1
Comments
6 min read
Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed
Cover image for Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Comments
2 min read
Shellcode call calc.exe - Why cannot use C write shellcode

Shellcode call calc.exe - Why cannot use C write shellcode

1
Comments
2 min read
Secure-by-Default Authorization for MCP Servers powered by ToolHive
Cover image for Secure-by-Default Authorization for MCP Servers powered by ToolHive

Secure-by-Default Authorization for MCP Servers powered by ToolHive

9
Comments
9 min read
Replace Twilio-based OTP (SMS login) system with Azure Active Directory (Azure AD)

Replace Twilio-based OTP (SMS login) system with Azure Active Directory (Azure AD)

16
Comments 2
2 min read
Security is a risk function

Security is a risk function

Comments
1 min read
AdGuard Home Configuration for LAN-Only Access

AdGuard Home Configuration for LAN-Only Access

Comments
3 min read
AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift
Cover image for AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

AI Is the New Trust Boundary: STL TechWeek Reveals the Risk Shift

1
Comments
7 min read
How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam

How I Passed the AWS Certified Security – Specialty (SCS-C02) Exam

1
Comments 8
2 min read
🛢️🗂️Database Version Control 🔝 Best Practice
Cover image for 🛢️🗂️Database Version Control 🔝 Best Practice

🛢️🗂️Database Version Control 🔝 Best Practice

10
Comments
4 min read
Congrats to the Permit.io Authorization Challenge Winners!
Cover image for Congrats to the Permit.io Authorization Challenge Winners!

Congrats to the Permit.io Authorization Challenge Winners!

42
Comments 20
2 min read
Rate Limiting in Node.js Using Redis and Token Bucket Algorithm
Cover image for Rate Limiting in Node.js Using Redis and Token Bucket Algorithm

Rate Limiting in Node.js Using Redis and Token Bucket Algorithm

1
Comments
3 min read
Multi-Tenant 👥 Database Architecture Patterns Explained💬
Cover image for Multi-Tenant 👥 Database Architecture Patterns Explained💬

Multi-Tenant 👥 Database Architecture Patterns Explained💬

6
Comments
4 min read
Vibe Check: Securing AI-Generated Code Using MCP
Cover image for Vibe Check: Securing AI-Generated Code Using MCP

Vibe Check: Securing AI-Generated Code Using MCP

6
Comments
4 min read
Getting Authentication Right is Critical to Running MCP Servers
Cover image for Getting Authentication Right is Critical to Running MCP Servers

Getting Authentication Right is Critical to Running MCP Servers

9
Comments
6 min read
loading...