Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What do hackers know about your website?

What do hackers know about your website?

Comments
2 min read
Is GitHub Sponsors Safe? A Comprehensive Guide

Is GitHub Sponsors Safe? A Comprehensive Guide

1
Comments
8 min read
Optimizing Docker Images: Reducing Size and Improving Security

Optimizing Docker Images: Reducing Size and Improving Security

3
Comments 1
5 min read
Online privacy isn’t niche anymore - it’s global.
Cover image for Online privacy isn’t niche anymore - it’s global.

Online privacy isn’t niche anymore - it’s global.

Comments
2 min read
HOW TO CREATE AND CONFIGURE AZURE FIREWALL
Cover image for HOW TO CREATE AND CONFIGURE AZURE FIREWALL

HOW TO CREATE AND CONFIGURE AZURE FIREWALL

Comments
4 min read
Building a Reverse Shell in Rust Using PEB Techniques

Building a Reverse Shell in Rust Using PEB Techniques

1
Comments
2 min read
Mastering External API Usage in Angular Interceptors with x-api-key

Mastering External API Usage in Angular Interceptors with x-api-key

Comments
4 min read
Achieve Highest level of security with BoldSign’s QES Compliance
Cover image for Achieve Highest level of security with BoldSign’s QES Compliance

Achieve Highest level of security with BoldSign’s QES Compliance

5
Comments
3 min read
Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

2
Comments
4 min read
Segurança no Front-end: dos ataques à prevenção
Cover image for Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

39
Comments 4
7 min read
Cybersecurity for Small Businesses: A Complete Guide

Cybersecurity for Small Businesses: A Complete Guide

Comments 2
4 min read
Threat Modeling for AI Apps | AI Security series
Cover image for Threat Modeling for AI Apps | AI Security series

Threat Modeling for AI Apps | AI Security series

1
Comments
3 min read
Serverless Meets Zero Trust: Designing Secure Cloud-Native Apps from Day One
Cover image for Serverless Meets Zero Trust: Designing Secure Cloud-Native Apps from Day One

Serverless Meets Zero Trust: Designing Secure Cloud-Native Apps from Day One

10
Comments 2
6 min read
Local Whisper & VoIP PBX: Why Maryrose Whittaker Sees On-Prem as the Privacy Linchpin

Local Whisper & VoIP PBX: Why Maryrose Whittaker Sees On-Prem as the Privacy Linchpin

Comments
3 min read
How to Receive Phone Call 📞 Alerts Using AWS CloudWatch, Lambda & Twilio

How to Receive Phone Call 📞 Alerts Using AWS CloudWatch, Lambda & Twilio

Comments
3 min read
What If Your App Becomes a Tool for Scammers?

What If Your App Becomes a Tool for Scammers?

Comments
9 min read
Using RBAC in Kubernetes: Role-Based Access Control Demystified

Using RBAC in Kubernetes: Role-Based Access Control Demystified

Comments
3 min read
JWT Security with OAuth

JWT Security with OAuth

1
Comments
1 min read
🐞 Comprehensive Bug Bounty Hunting Methodology

🐞 Comprehensive Bug Bounty Hunting Methodology

1
Comments
32 min read
Fortifying Cloud-Native Applications: Key Security Measures
Cover image for Fortifying Cloud-Native Applications: Key Security Measures

Fortifying Cloud-Native Applications: Key Security Measures

Comments
13 min read
Unlocking Transparency: The Role of Blockchain Audit Trails in Modern Security

Unlocking Transparency: The Role of Blockchain Audit Trails in Modern Security

Comments
8 min read
SQL Server 2022 Standard with 5 Device CAL: A Scalable, Secure, and Efficient Database Solution for Modern Businesses

SQL Server 2022 Standard with 5 Device CAL: A Scalable, Secure, and Efficient Database Solution for Modern Businesses

Comments
4 min read
7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Securing Temporary Credentials in AWS: What You Should Be Doing But Probably Aren’t

Securing Temporary Credentials in AWS: What You Should Be Doing But Probably Aren’t

Comments
2 min read
5 Key Application Security Types & The Tools You Need to Protect Them
Cover image for 5 Key Application Security Types & The Tools You Need to Protect Them

5 Key Application Security Types & The Tools You Need to Protect Them

1
Comments
5 min read
loading...