Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

4
Comments
3 min read
Common Cybersecurity Misconceptions and How to Avoid Them
Cover image for Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
Open Redirects in Laravel: A Critical Guide to Secure Your Application
Cover image for Open Redirects in Laravel: A Critical Guide to Secure Your Application

Open Redirects in Laravel: A Critical Guide to Secure Your Application

2
Comments
3 min read
Cybersecurity Understanding the OWASP® Top 10 Security Threats

Cybersecurity Understanding the OWASP® Top 10 Security Threats

1
Comments
1 min read
How can you secure microservices architecture using AWS services?
Cover image for How can you secure microservices architecture using AWS services?

How can you secure microservices architecture using AWS services?

1
Comments
2 min read
Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒
Cover image for Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

1
Comments
2 min read
Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Comments
6 min read
Getting Started with AWS Security Credentials and CLI 🧑‍💻

Getting Started with AWS Security Credentials and CLI 🧑‍💻

Comments
2 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
What are the main challenges in SaaS product development

What are the main challenges in SaaS product development

Comments
2 min read
I am a wall - Call me a VPC
Cover image for I am a wall - Call me a VPC

I am a wall - Call me a VPC

2
Comments 2
3 min read
Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work
Cover image for Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Comments
5 min read
Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

1
Comments
3 min read
API Authentication: Part I. Basic Authentication
Cover image for API Authentication: Part I. Basic Authentication

API Authentication: Part I. Basic Authentication

Comments
11 min read
The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

Comments
3 min read
Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.
Cover image for Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.

Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.

1
Comments
3 min read
Can We Truly Trust VPNs and Anonymity Tools?

Can We Truly Trust VPNs and Anonymity Tools?

6
Comments 1
2 min read
How Java Development Services Ensure Robust Security for Enterprise-Level Applications

How Java Development Services Ensure Robust Security for Enterprise-Level Applications

Comments
7 min read
Will AI be banned? A game theory analysis.

Will AI be banned? A game theory analysis.

3
Comments
20 min read
MitM Attacks in Laravel: Prevention and Coding Examples
Cover image for MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity
Cover image for Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

18
Comments
1 min read
Beyond Docker - A DevOps Engineer's Guide to Container Alternatives
Cover image for Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

60
Comments 2
4 min read
Validação e Sanitização em Aplicações Web

Validação e Sanitização em Aplicações Web

Comments
2 min read
The Rising Tide of Platform Engineering: Reshaping Security in Modern DevOps
Cover image for The Rising Tide of Platform Engineering: Reshaping Security in Modern DevOps

The Rising Tide of Platform Engineering: Reshaping Security in Modern DevOps

11
Comments 1
3 min read
loading...