Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Many AI Tokens to Play a Game of Chess?
Cover image for How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)
Cover image for She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

8
Comments
2 min read
Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data
Cover image for Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

4
Comments
5 min read
🚨 Monitoring in 2025: 6 Rules That Saved My Projects

🚨 Monitoring in 2025: 6 Rules That Saved My Projects

Comments
1 min read
Top 6 BoldSign Features That Make E-Signatures Effortless
Cover image for Top 6 BoldSign Features That Make E-Signatures Effortless

Top 6 BoldSign Features That Make E-Signatures Effortless

3
Comments
4 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
8 important security changes from Android 8 to Android 15
Cover image for 8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

Comments
3 min read
Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025
Cover image for Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

1
Comments
5 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
JWT Authentication Deep Dive: Creation, Storage, and Verification
Cover image for JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

1
Comments
4 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control
Cover image for Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover
Cover image for IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025
Cover image for 15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

Comments
2 min read
How to Protect the SafeLine Management Interface

How to Protect the SafeLine Management Interface

5
Comments
1 min read
Breaking The Unbreakable: Bypassing Arkose Labs on iOS
Cover image for Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Comments
7 min read
Wazuh: Your Open-Source Security Superhero
Cover image for Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments
3 min read
Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite
Cover image for Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Comments
4 min read
Go & AES-GCM: A Security Deep Dive

Go & AES-GCM: A Security Deep Dive

Comments
4 min read
What is Rate Limiting and How to Add It in Django
Cover image for What is Rate Limiting and How to Add It in Django

What is Rate Limiting and How to Add It in Django

1
Comments
2 min read
💀 MaskGod: The Final Boss of URL Masking 🕶️
Cover image for 💀 MaskGod: The Final Boss of URL Masking 🕶️

💀 MaskGod: The Final Boss of URL Masking 🕶️

11
Comments 4
2 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks
Cover image for (Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

11
Comments 4
11 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
loading...