Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Authentication and Authorization in Django: Django session
Cover image for Authentication and Authorization in Django: Django session

Authentication and Authorization in Django: Django session

Comments
5 min read
Security-First Architecture in Azure Logic Apps: Patterns, Practices, and Compliance

Security-First Architecture in Azure Logic Apps: Patterns, Practices, and Compliance

Comments
4 min read
Event Recap: SOSS: Fusion Conference

Event Recap: SOSS: Fusion Conference

Comments
2 min read
My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how
Cover image for My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

2
Comments
2 min read
Hacking My Own AWS Account: A Tale of Legacy Systems and Modern Solutions
Cover image for Hacking My Own AWS Account: A Tale of Legacy Systems and Modern Solutions

Hacking My Own AWS Account: A Tale of Legacy Systems and Modern Solutions

3
Comments 1
3 min read
AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks
Cover image for AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

3
Comments
3 min read
Formal Verification: Bridging Theory and Practice

Formal Verification: Bridging Theory and Practice

Comments
3 min read
Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection
Cover image for Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection

Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection

2
Comments 2
6 min read
Don’t Let Your Code Become the Titanic
Cover image for Don’t Let Your Code Become the Titanic

Don’t Let Your Code Become the Titanic

Comments
4 min read
PSA: Add the following to your Vercel project's firewall

PSA: Add the following to your Vercel project's firewall

6
Comments
1 min read
Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments
Cover image for Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments

Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments

2
Comments
5 min read
OAuth2 Authorization Code Grant Type: A Deep Dive
Cover image for OAuth2 Authorization Code Grant Type: A Deep Dive

OAuth2 Authorization Code Grant Type: A Deep Dive

Comments
3 min read
Non-functional Application Requirements: Security
Cover image for Non-functional Application Requirements: Security

Non-functional Application Requirements: Security

17
Comments 2
9 min read
10 Ways To Secure Docker Images: Best Strategies
Cover image for 10 Ways To Secure Docker Images: Best Strategies

10 Ways To Secure Docker Images: Best Strategies

7
Comments
4 min read
These are the Ghost Engineers that you want
Cover image for These are the Ghost Engineers that you want

These are the Ghost Engineers that you want

1
Comments
2 min read
ShadowStrike: A Modern DDoS Testing Tool for Website Security
Cover image for ShadowStrike: A Modern DDoS Testing Tool for Website Security

ShadowStrike: A Modern DDoS Testing Tool for Website Security

6
Comments
2 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

Comments 1
1 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

2
Comments
1 min read
Importando certificado SSL no cacerts, via KeyStore Explorer

Importando certificado SSL no cacerts, via KeyStore Explorer

1
Comments
1 min read
New AWS WAF Feature: Top Insights Visualizations 02:37

New AWS WAF Feature: Top Insights Visualizations

3
Comments
1 min read
Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)
Cover image for Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

Combine AWS WAF with reactive infrastructure to block attackers (and don't go broke in the process)

10
Comments 2
3 min read
Understanding Firewalls In Cybersecurity
Cover image for Understanding Firewalls In Cybersecurity

Understanding Firewalls In Cybersecurity

4
Comments 1
3 min read
Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers
Cover image for Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

Introducing DorkHub: A Comprehensive Collection of Google Dorks for Security Researchers

9
Comments 1
2 min read
12 Essential Tips for API Security — Every Backend Developer Must Know.
Cover image for 12 Essential Tips for API Security — Every Backend Developer Must Know.

12 Essential Tips for API Security — Every Backend Developer Must Know.

Comments
1 min read
Rails GraphQL Auth - JWT, Email & Security
Cover image for Rails GraphQL Auth - JWT, Email & Security

Rails GraphQL Auth - JWT, Email & Security

Comments
4 min read
loading...