Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Basic API Security Testing Checklist for Developers and Pentesters

Basic API Security Testing Checklist for Developers and Pentesters

1
Comments 1
3 min read
Firewall Policies & NAT: Mastering Security and Network Flow

Firewall Policies & NAT: Mastering Security and Network Flow

Comments
3 min read
Restricting Container Capabilities: Reducing the Kernel Attack Surface in Docker
Cover image for Restricting Container Capabilities: Reducing the Kernel Attack Surface in Docker

Restricting Container Capabilities: Reducing the Kernel Attack Surface in Docker

Comments
4 min read
Securing Docker Networking: Limiting Exposure and Enhancing Isolation
Cover image for Securing Docker Networking: Limiting Exposure and Enhancing Isolation

Securing Docker Networking: Limiting Exposure and Enhancing Isolation

Comments
3 min read
Securing Docker Images: Best Practices for a Hardened Container Build
Cover image for Securing Docker Images: Best Practices for a Hardened Container Build

Securing Docker Images: Best Practices for a Hardened Container Build

Comments
4 min read
Container Isolation: Understanding Namespaces and Control Groups in Docker
Cover image for Container Isolation: Understanding Namespaces and Control Groups in Docker

Container Isolation: Understanding Namespaces and Control Groups in Docker

1
Comments
4 min read
Understanding Docker Security Basics: Building a Strong Foundation
Cover image for Understanding Docker Security Basics: Building a Strong Foundation

Understanding Docker Security Basics: Building a Strong Foundation

2
Comments
4 min read
How to Customize ASP.NET Core Identity With EF Core for Your Project Needs
Cover image for How to Customize ASP.NET Core Identity With EF Core for Your Project Needs

How to Customize ASP.NET Core Identity With EF Core for Your Project Needs

1
Comments 2
9 min read
CryptoRave, BSides, DevOpsDays e o impacto de participar de eventos de Tecnologia

CryptoRave, BSides, DevOpsDays e o impacto de participar de eventos de Tecnologia

3
Comments
2 min read
Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

Segurança no Desenvolvimento: Da Teoria à Prática – Introdução

7
Comments
2 min read
Chaos Engineering: Breaking Things On Purpose
Cover image for Chaos Engineering: Breaking Things On Purpose

Chaos Engineering: Breaking Things On Purpose

2
Comments 1
6 min read
How to Prevent Disasters in Laravel (A Critical Tip for Professional Developers)
Cover image for How to Prevent Disasters in Laravel (A Critical Tip for Professional Developers)

How to Prevent Disasters in Laravel (A Critical Tip for Professional Developers)

4
Comments
2 min read
How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods
Cover image for How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods

How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods

1
Comments
4 min read
The Foundation of Signal - Why End-to-End Encryption Matters
Cover image for The Foundation of Signal - Why End-to-End Encryption Matters

The Foundation of Signal - Why End-to-End Encryption Matters

7
Comments 1
3 min read
The Sender Policy Framework: Bare Bone Essentials
Cover image for The Sender Policy Framework: Bare Bone Essentials

The Sender Policy Framework: Bare Bone Essentials

6
Comments 2
3 min read
How AI is Reshaping Compliance Monitoring in 2025

How AI is Reshaping Compliance Monitoring in 2025

Comments
2 min read
Protect your Virtual Machine with Fail2ban
Cover image for Protect your Virtual Machine with Fail2ban

Protect your Virtual Machine with Fail2ban

Comments
2 min read
Security IAM Role

Security IAM Role

Comments 2
1 min read
Authentication Alternatives in 2025: A Developer's Guide Beyond Auth0

Authentication Alternatives in 2025: A Developer's Guide Beyond Auth0

1
Comments
6 min read
🚧 Understanding CORS: Cross-Origin Resource Sharing for Web Developers

🚧 Understanding CORS: Cross-Origin Resource Sharing for Web Developers

1
Comments
2 min read
Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor
Cover image for Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor

Detecting SSH Brute Force Attacks with Python: Building a Simple Monitor

3
Comments
4 min read
🛡️ Secure, Lint, and Validate Your Terraform Like a Pro
Cover image for 🛡️ Secure, Lint, and Validate Your Terraform Like a Pro

🛡️ Secure, Lint, and Validate Your Terraform Like a Pro

5
Comments 1
5 min read
Log Aggregation with Python: Bringing Clarity to Distributed Security Data
Cover image for Log Aggregation with Python: Bringing Clarity to Distributed Security Data

Log Aggregation with Python: Bringing Clarity to Distributed Security Data

Comments
4 min read
Building a Log Parser in Python: Turning Raw Logs into Security Insights
Cover image for Building a Log Parser in Python: Turning Raw Logs into Security Insights

Building a Log Parser in Python: Turning Raw Logs into Security Insights

3
Comments
4 min read
What If Compliance Was Cool? Turning ISO into a Competitive Edge
Cover image for What If Compliance Was Cool? Turning ISO into a Competitive Edge

What If Compliance Was Cool? Turning ISO into a Competitive Edge

1
Comments 1
5 min read
loading...