Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Go Security for Beginners: Understanding and Protecting Your Code

Go Security for Beginners: Understanding and Protecting Your Code

2
Comments 2
5 min read
Database Security in DBMS

Database Security in DBMS

1
Comments
6 min read
Security Starts With Developer Enablement: Lessons From PHP TEK 2025

Security Starts With Developer Enablement: Lessons From PHP TEK 2025

1
Comments 2
6 min read
🔐 OAuth 2.0: The Modern Gatekeeper of Secure Authorization

🔐 OAuth 2.0: The Modern Gatekeeper of Secure Authorization

Comments
4 min read
Product Engineers Should Ship Fast AND Secure Vibe Generated Code

Product Engineers Should Ship Fast AND Secure Vibe Generated Code

1
Comments 1
3 min read
An Overview to OCI IAM Policies

An Overview to OCI IAM Policies

Comments
12 min read
CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

Comments
2 min read
OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

OWASP® Cornucopia 2.2 & Copi - A Game Engine for OWASP® Cornucopia Threat Modeling

6
Comments 1
4 min read
The future of passwords is bright

The future of passwords is bright

7
Comments
1 min read
How to Generate an AI SBOM, and What Tools to Use

How to Generate an AI SBOM, and What Tools to Use

23
Comments 3
5 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
How to Train Employees on Cybersecurity Awareness

How to Train Employees on Cybersecurity Awareness

Comments 2
3 min read
Securing APIs Against Unauthorized Access

Securing APIs Against Unauthorized Access

Comments
1 min read
Community Resilience as a Security Capability: Lessons from BSides SF 2025

Community Resilience as a Security Capability: Lessons from BSides SF 2025

1
Comments
6 min read
Seccomp in Docker: Locking Down System Calls for a Leaner Attack Surface

Seccomp in Docker: Locking Down System Calls for a Leaner Attack Surface

Comments
3 min read
The Definitive Auth Guide for Backend Developers

The Definitive Auth Guide for Backend Developers

12
Comments 1
21 min read
Understanding RSA - The Math behind modern encryption

Understanding RSA - The Math behind modern encryption

Comments
3 min read
BitLocker Limbo PSA

BitLocker Limbo PSA

2
Comments
2 min read
Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever

Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever

Comments
1 min read
4 OSQuery Commands to run on a Mac

4 OSQuery Commands to run on a Mac

Comments
2 min read
Android Kiosk Mode: The Ultimate Guide to Locking Down Devices

Android Kiosk Mode: The Ultimate Guide to Locking Down Devices

1
Comments
6 min read
Unlocking Digital Excellence with Microsoft 365 E3

Unlocking Digital Excellence with Microsoft 365 E3

Comments
4 min read
Guards vs Interceptors no NestJS: quando usar cada um?

Guards vs Interceptors no NestJS: quando usar cada um?

Comments
3 min read
Unlocking Productivity and Security with Office 365 E3: A Smart Choice for Modern Enterprises

Unlocking Productivity and Security with Office 365 E3: A Smart Choice for Modern Enterprises

Comments
4 min read
Endpoint Security: A Low-Cost Data Diode

Endpoint Security: A Low-Cost Data Diode

3
Comments
3 min read
loading...