Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Essential Security Best Practices for Ruby on Rails

Essential Security Best Practices for Ruby on Rails

15
Comments 2
10 min read
Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Comments
3 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Looking for potential vulnerabilities in code, part 2: practice

Looking for potential vulnerabilities in code, part 2: practice

Comments 2
14 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

7
Comments
1 min read
How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?
Cover image for How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

Comments
2 min read
Enhancing Web Application Security with AES, RSA, and Hashing Techniques

Enhancing Web Application Security with AES, RSA, and Hashing Techniques

Comments
4 min read
Talos Linux Part 2: Meet Omni – The Managed Kubernetes Platform Powered by Talos

Talos Linux Part 2: Meet Omni – The Managed Kubernetes Platform Powered by Talos

2
Comments
4 min read
Level Up Your AWS Security: A Detailed Prioritized Checklist from the Trenches

Level Up Your AWS Security: A Detailed Prioritized Checklist from the Trenches

1
Comments
4 min read
Introducción a Amazon GuardDuty: Generar hallazgos de prueba
Cover image for Introducción a Amazon GuardDuty: Generar hallazgos de prueba

Introducción a Amazon GuardDuty: Generar hallazgos de prueba

5
Comments
3 min read
Building Scalable PHP Applications: Best Practices for Performance and Security

Building Scalable PHP Applications: Best Practices for Performance and Security

4
Comments 2
3 min read
Data Privacy in the API Economy: Balancing Innovation with Security
Cover image for Data Privacy in the API Economy: Balancing Innovation with Security

Data Privacy in the API Economy: Balancing Innovation with Security

16
Comments 1
6 min read
Tech innovator

Tech innovator

Comments
1 min read
Setting up TLS connection for containerized PostgreSQL database

Setting up TLS connection for containerized PostgreSQL database

4
Comments
4 min read
Authentication and Authorization Best Practices
Cover image for Authentication and Authorization Best Practices

Authentication and Authorization Best Practices

Comments
3 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Comments
3 min read
Compliance Tools for Cloud Environments

Compliance Tools for Cloud Environments

1
Comments
4 min read
Tríade CIA e Sua Importância na Cibersegurança.
Cover image for Tríade CIA e Sua Importância na Cibersegurança.

Tríade CIA e Sua Importância na Cibersegurança.

Comments
3 min read
The Future of Web Applications: Innovation, AI, and Seamless Experiences

The Future of Web Applications: Innovation, AI, and Seamless Experiences

1
Comments
2 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm
Cover image for Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm
Cover image for Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Advanced Docker Scout: Real-World Implementation Patterns and Best Practices
Cover image for Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

1
Comments
3 min read
Stop Forcing Complex Passwords on the Web
Cover image for Stop Forcing Complex Passwords on the Web

Stop Forcing Complex Passwords on the Web

Comments
3 min read
How SSH (Secure Shell) Works
Cover image for How SSH (Secure Shell) Works

How SSH (Secure Shell) Works

3
Comments
1 min read
loading...