Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Stop Using Go Templates for SQL (Until You Read This)

Stop Using Go Templates for SQL (Until You Read This)

Comments
2 min read
Securing Client Communication: A Must for SMEs
Cover image for Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Modernizing Security Operations with Zero Trust Architecture on AWS
Cover image for Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
Tutorial: How to protect your business from referral fraud
Cover image for Tutorial: How to protect your business from referral fraud

Tutorial: How to protect your business from referral fraud

Comments
11 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
JSON + Prometheus SECURELY
Cover image for JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

Comments
1 min read
Best Practices for Secure PHP Coding
Cover image for Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

1
Comments
3 min read
Account Email and Password Change using .NET Identity
Cover image for Account Email and Password Change using .NET Identity

Account Email and Password Change using .NET Identity

1
Comments
6 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2
Cover image for Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
Hidden Vulnerabilities - DeepSeek / LLM's

Hidden Vulnerabilities - DeepSeek / LLM's

8
Comments 2
2 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
What is Zero Trust Security?
Cover image for What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 2
2 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
🔐 DeepSeek AI: Balance Power & Privacy 🤖
Cover image for 🔐 DeepSeek AI: Balance Power & Privacy 🤖

🔐 DeepSeek AI: Balance Power & Privacy 🤖

Comments
1 min read
Web Security with Content Security Policy (CSP) and JavaScript
Cover image for Web Security with Content Security Policy (CSP) and JavaScript

Web Security with Content Security Policy (CSP) and JavaScript

Comments
4 min read
HttpOnly Cookies: A Secure Solution for Sensitive Data

HttpOnly Cookies: A Secure Solution for Sensitive Data

Comments
3 min read
Understanding Proxy Servers
Cover image for Understanding Proxy Servers

Understanding Proxy Servers

1
Comments 1
4 min read
Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security
Cover image for Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Comments
6 min read
CEH: Advanced Penetration Testing Guide
Cover image for CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices
Cover image for Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

11
Comments
4 min read
Ransomware: A Wake-Up Call for the Digital Age
Cover image for Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

Comments 1
4 min read
Authorization using .NET Identity
Cover image for Authorization using .NET Identity

Authorization using .NET Identity

4
Comments
6 min read
Deploying smartcontracts through github actions using AWS secret manager
Cover image for Deploying smartcontracts through github actions using AWS secret manager

Deploying smartcontracts through github actions using AWS secret manager

Comments
4 min read
Angular Security Best Practices Guide

Angular Security Best Practices Guide

1
Comments
6 min read
loading...