Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Augment Cline and your LLM with up-to-date risk insight using CodeGate

Augment Cline and your LLM with up-to-date risk insight using CodeGate

4
Comments
1 min read
Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story
Cover image for Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Comments
39 min read
Authentication Vs Authorization In Backend Systems
Cover image for Authentication Vs Authorization In Backend Systems

Authentication Vs Authorization In Backend Systems

1
Comments 2
2 min read
Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Comments
3 min read
Autorização em Golang
Cover image for Autorização em Golang

Autorização em Golang

1
Comments
1 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe
Cover image for Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
A Phish on a Fork, no Chips
Cover image for A Phish on a Fork, no Chips

A Phish on a Fork, no Chips

13
Comments 1
4 min read
Leading Docker Adoption: A Senior Manager’s Perspective
Cover image for Leading Docker Adoption: A Senior Manager’s Perspective

Leading Docker Adoption: A Senior Manager’s Perspective

3
Comments
2 min read
How to configure CORS for Next.js
Cover image for How to configure CORS for Next.js

How to configure CORS for Next.js

3
Comments
7 min read
CodeMash 2025: A Community Conversation About NHI And Secrets Security

CodeMash 2025: A Community Conversation About NHI And Secrets Security

Comments
7 min read
Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia
Cover image for Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

1
Comments
5 min read
Demystifying Social Logins: How OAuth2 Powers Seamless Authentication
Cover image for Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Comments
5 min read
Token based Authentication using .NET Identity
Cover image for Token based Authentication using .NET Identity

Token based Authentication using .NET Identity

Comments
10 min read
How to Set Up Two-Factor Authentication on WordPress Without Plugin
Cover image for How to Set Up Two-Factor Authentication on WordPress Without Plugin

How to Set Up Two-Factor Authentication on WordPress Without Plugin

5
Comments
4 min read
Hybrid Cloud or Multi Cloud: Which is a More Secure Option?
Cover image for Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

1
Comments
5 min read
Quick Cookie Management Tips
Cover image for Quick Cookie Management Tips

Quick Cookie Management Tips

Comments 1
3 min read
Quick Cookie Management Tips
Cover image for Quick Cookie Management Tips

Quick Cookie Management Tips

Comments
3 min read
GCP Workload Identity - Kubernetes Federation
Cover image for GCP Workload Identity - Kubernetes Federation

GCP Workload Identity - Kubernetes Federation

1
Comments
4 min read
Fail2ban
Cover image for Fail2ban

Fail2ban

Comments
1 min read
Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Comments
3 min read
Difference between AWS Security Groups and NACL
Cover image for Difference between AWS Security Groups and NACL

Difference between AWS Security Groups and NACL

Comments
4 min read
Top Infrastructure as Code Security Tools in 2025
Cover image for Top Infrastructure as Code Security Tools in 2025

Top Infrastructure as Code Security Tools in 2025

Comments
8 min read
Como criar uma chave GPG e contribuir de maneira segura para projetos open-source
Cover image for Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

8
Comments
3 min read
OWASP Dependency Check on Azure DevOps
Cover image for OWASP Dependency Check on Azure DevOps

OWASP Dependency Check on Azure DevOps

Comments
4 min read
OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks
Cover image for OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

1
Comments
3 min read
loading...