Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Automated Penetration Testing: A Guide to Domain Collection
Cover image for Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
Avoiding Production Disasters with npm ci: The Key to Stable Deployments
Cover image for Avoiding Production Disasters with npm ci: The Key to Stable Deployments

Avoiding Production Disasters with npm ci: The Key to Stable Deployments

7
Comments 1
3 min read
The Problem with Traditional Security Tools

The Problem with Traditional Security Tools

Comments
2 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.
Cover image for Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI
Cover image for Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Why we as Europeans need to ditch US tech and how

Why we as Europeans need to ditch US tech and how

2
Comments 4
4 min read
Code Reviews with AI: a Developer Guide
Cover image for Code Reviews with AI: a Developer Guide

Code Reviews with AI: a Developer Guide

5
Comments 3
10 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
Security news weekly round-up - 7th February 2025
Cover image for Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
Intro to Service Workers: Best Practices & Threat Mitigation
Cover image for Intro to Service Workers: Best Practices & Threat Mitigation

Intro to Service Workers: Best Practices & Threat Mitigation

2
Comments 1
4 min read
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
Best Practices for Storing Access Tokens in the Browser
Cover image for Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

1
Comments
2 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

5
Comments
4 min read
Why Authorization Matters and How Cerbos Revolutionizes It
Cover image for Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
A Novel Approach for Text Encryption Using Tokenizers in Ruby
Cover image for A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
From Data Breach to Insight: Exploring the Intersection of Cybersecurity and Communication
Cover image for From Data Breach to Insight: Exploring the Intersection of Cybersecurity and Communication

From Data Breach to Insight: Exploring the Intersection of Cybersecurity and Communication

1
Comments 2
3 min read
Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

1
Comments
3 min read
Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?
Cover image for Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

2
Comments
2 min read
Understanding AWS Cognito: A Complete Guide to User Authentication and Management

Understanding AWS Cognito: A Complete Guide to User Authentication and Management

2
Comments 1
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps
Cover image for Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow
Cover image for DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

Comments
2 min read
loading...