Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 6 BoldSign Features That Make E-Signatures Effortless

Top 6 BoldSign Features That Make E-Signatures Effortless

3
Comments
4 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Comments
35 min read
OpsGaurd - A Smart Access AI-Driven Tenant-Safe.

OpsGaurd - A Smart Access AI-Driven Tenant-Safe.

1
Comments
3 min read
JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

3
Comments
4 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

3
Comments
2 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
How BoldSign Ensures UETA Compliance for Electronic Signatures

How BoldSign Ensures UETA Compliance for Electronic Signatures

3
Comments
3 min read
How to Protect the SafeLine Management Interface

How to Protect the SafeLine Management Interface

5
Comments
1 min read
Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Comments
7 min read
Go & AES-GCM: A Security Deep Dive

Go & AES-GCM: A Security Deep Dive

Comments
4 min read
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments
3 min read
Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Comments
4 min read
Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

13
Comments 4
11 min read
What is Rate Limiting and How to Add It in Django

What is Rate Limiting and How to Add It in Django

1
Comments
2 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
AICHA: AI-Powered Healthcare Assistant with Permit.io Authorization

AICHA: AI-Powered Healthcare Assistant with Permit.io Authorization

1
Comments
10 min read
Understanding MCP and Its Security Implications

Understanding MCP and Its Security Implications

Comments
4 min read
Building a Secret Scanner in Julia: A GitLeaks Alternative

Building a Secret Scanner in Julia: A GitLeaks Alternative

Comments
4 min read
Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io

Securing AI Document Systems: Implementing the Four-Perimeter Framework with Permit.io

6
Comments 3
6 min read
leftpad, vibe-coding e o mercado que corta custos a qualquer custo

leftpad, vibe-coding e o mercado que corta custos a qualquer custo

1
Comments
3 min read
loading...