Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

10
Comments
4 min read
Best Practices for Storing and Securing Passwords: A Developer's Guide
Cover image for Best Practices for Storing and Securing Passwords: A Developer's Guide

Best Practices for Storing and Securing Passwords: A Developer's Guide

6
Comments
5 min read
Does Patching Containers Feel Like Whack-a-Mole?
Cover image for Does Patching Containers Feel Like Whack-a-Mole?

Does Patching Containers Feel Like Whack-a-Mole?

1
Comments
2 min read
⚡ Secure your containers faster—without disrupting your workflow
Cover image for ⚡ Secure your containers faster—without disrupting your workflow

⚡ Secure your containers faster—without disrupting your workflow

1
Comments
3 min read
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

1
Comments
3 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist
Cover image for GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
BL-SOC01 - Jump Into SOC

BL-SOC01 - Jump Into SOC

3
Comments 1
5 min read
Non-Human Identity Security in the Age of AI
Cover image for Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments 1
7 min read
ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

Comments
2 min read
Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Comments
2 min read
Why your environment variables aren’t safe
Cover image for Why your environment variables aren’t safe

Why your environment variables aren’t safe

7
Comments 1
9 min read
Meet BeanoGuard – Your New Best Friend for Secure Passwords

Meet BeanoGuard – Your New Best Friend for Secure Passwords

2
Comments
2 min read
The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards
Cover image for The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

Comments
4 min read
Understanding the STRIDE Function in Cybersecurity
Cover image for Understanding the STRIDE Function in Cybersecurity

Understanding the STRIDE Function in Cybersecurity

Comments
3 min read
Using YubiKeys for passwordless authentication in Cognito user pools

Using YubiKeys for passwordless authentication in Cognito user pools

6
Comments
6 min read
AWS security and compliance

AWS security and compliance

Comments 1
1 min read
Post-Quantum Cryptography
Cover image for Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
Google OIDC and Prompt Login
Cover image for Google OIDC and Prompt Login

Google OIDC and Prompt Login

2
Comments
1 min read
🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

4
Comments
3 min read
RS Authenticator – Your Ultimate 2FA Security Solution!
Cover image for RS Authenticator – Your Ultimate 2FA Security Solution!

RS Authenticator – Your Ultimate 2FA Security Solution!

Comments
1 min read
Introducing SmartScanner: Your Go-To Security Buddy for Node.js
Cover image for Introducing SmartScanner: Your Go-To Security Buddy for Node.js

Introducing SmartScanner: Your Go-To Security Buddy for Node.js

1
Comments
4 min read
Secrets Management Best Practices for Team Collaboration
Cover image for Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
What is a Smurf Attack?

What is a Smurf Attack?

1
Comments
4 min read
How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

Comments
2 min read
loading...