Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Terraform AWSCC provider resources with Guard Hooks

Secure Terraform AWSCC provider resources with Guard Hooks

5
Comments
5 min read
What is Public Key Cryptography? A Guide to Secure Encryption
Cover image for What is Public Key Cryptography? A Guide to Secure Encryption

What is Public Key Cryptography? A Guide to Secure Encryption

Comments
4 min read
Enhance Your App's Security with OTP-Agent

Enhance Your App's Security with OTP-Agent

Comments
2 min read
ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes
Cover image for ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes

ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes

Comments
3 min read
Implementing TOTP-Based Two-Factor Authentication in .NET Web API

Implementing TOTP-Based Two-Factor Authentication in .NET Web API

1
Comments
3 min read
Novel Optimization Algorithms: From Entertainment to Military Applications

Novel Optimization Algorithms: From Entertainment to Military Applications

Comments
1 min read
Como configurar 2FA em Servidores Linux
Cover image for Como configurar 2FA em Servidores Linux

Como configurar 2FA em Servidores Linux

Comments
3 min read
Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Comments
6 min read
"KQL Showdown: distinct vs project"

"KQL Showdown: distinct vs project"

1
Comments
1 min read
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

2
Comments
2 min read
Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript
Cover image for Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

26
Comments 13
4 min read
The Evolution of Authentication : From Passwords to Passkeys
Cover image for The Evolution of Authentication : From Passwords to Passkeys

The Evolution of Authentication : From Passwords to Passkeys

6
Comments 1
8 min read
Complete Guide to AWS VPC Endpoints and PrivateLink: Making AWS Services Private! 🚀

Complete Guide to AWS VPC Endpoints and PrivateLink: Making AWS Services Private! 🚀

Comments
2 min read
VPN (Bite-size Article)
Cover image for VPN (Bite-size Article)

VPN (Bite-size Article)

1
Comments 1
8 min read
Eavesdropping Drones

Eavesdropping Drones

Comments
1 min read
Security news weekly round-up - 14th February 2025
Cover image for Security news weekly round-up - 14th February 2025

Security news weekly round-up - 14th February 2025

1
Comments
4 min read
The Future of Login Systems: Biometric Authentication
Cover image for The Future of Login Systems: Biometric Authentication

The Future of Login Systems: Biometric Authentication

1
Comments
3 min read
Networking 101: Part 6
Cover image for Networking 101: Part 6

Networking 101: Part 6

6
Comments
16 min read
Certificate Generation using OpenSSL locally

Certificate Generation using OpenSSL locally

Comments
2 min read
Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform
Cover image for Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Comments
4 min read
API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

6
Comments
3 min read
How JWT, JWS, and JWE Secure Your Data?
Cover image for How JWT, JWS, and JWE Secure Your Data?

How JWT, JWS, and JWE Secure Your Data?

3
Comments
4 min read
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
Running Ollama in a Container Without Internet Access

Running Ollama in a Container Without Internet Access

6
Comments
3 min read
How to pass the OWASP MASVS verification by design
Cover image for How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

4
Comments
6 min read
loading...