Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Comments
3 min read
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code
Cover image for How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

11
Comments
6 min read
Debian 12 … is amazing! How to: Create your custom codehouse #4 [Security Mechanisms Against Network-Based Attacks]
Cover image for Debian 12 … is amazing! How to: Create your custom codehouse #4 [Security Mechanisms Against Network-Based Attacks]

Debian 12 … is amazing! How to: Create your custom codehouse #4 [Security Mechanisms Against Network-Based Attacks]

1
Comments 1
17 min read
Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Comments
2 min read
Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻
Cover image for Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

89
Comments 12
4 min read
Managing Dependabot PRs with dependabot-pr-manager 🤖
Cover image for Managing Dependabot PRs with dependabot-pr-manager 🤖

Managing Dependabot PRs with dependabot-pr-manager 🤖

26
Comments 4
3 min read
Role-Based Access Control (RBAC) with Feature-Centric Approach
Cover image for Role-Based Access Control (RBAC) with Feature-Centric Approach

Role-Based Access Control (RBAC) with Feature-Centric Approach

2
Comments
3 min read
LINUX CHALLENGE, DAY 4
Cover image for LINUX CHALLENGE, DAY 4

LINUX CHALLENGE, DAY 4

1
Comments
1 min read
Error 403 Unauthorized: Understanding Its Implications for Apache Security

Error 403 Unauthorized: Understanding Its Implications for Apache Security

Comments
6 min read
Authentication vs. Authorization: Key Differences and Security Risks Explained

Authentication vs. Authorization: Key Differences and Security Risks Explained

Comments
2 min read
Understanding JWT Security Principle
Cover image for Understanding JWT Security Principle

Understanding JWT Security Principle

Comments
2 min read
Schema Validation in Amazon DynamoDB
Cover image for Schema Validation in Amazon DynamoDB

Schema Validation in Amazon DynamoDB

1
Comments
2 min read
Security news weekly round-up - 8th November 2024
Cover image for Security news weekly round-up - 8th November 2024

Security news weekly round-up - 8th November 2024

Comments
4 min read
BSides Orlando 2024: Insights, Innovations, and Security Adventures
Cover image for BSides Orlando 2024: Insights, Innovations, and Security Adventures

BSides Orlando 2024: Insights, Innovations, and Security Adventures

Comments
7 min read
Laravel Application Security

Laravel Application Security

Comments 1
2 min read
Hardware Security Modules: Preparing for the Post-Quantum Era
Cover image for Hardware Security Modules: Preparing for the Post-Quantum Era

Hardware Security Modules: Preparing for the Post-Quantum Era

1
Comments
5 min read
Security by Design: Building Trust in Blockchain, One Block at a Time
Cover image for Security by Design: Building Trust in Blockchain, One Block at a Time

Security by Design: Building Trust in Blockchain, One Block at a Time

Comments
2 min read
Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan
Cover image for Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

1
Comments
9 min read
New tools for effortless policy creation and testing in Cerbos Hub
Cover image for New tools for effortless policy creation and testing in Cerbos Hub

New tools for effortless policy creation and testing in Cerbos Hub

Comments
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

4
Comments
4 min read
Essential AWS Security Services to Safeguard Your AWS Cloud Workloads
Cover image for Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

3
Comments 1
4 min read
Identity Management: The Foundation for Security Implementation
Cover image for Identity Management: The Foundation for Security Implementation

Identity Management: The Foundation for Security Implementation

8
Comments 1
5 min read
Storing passwords safely (C#)
Cover image for Storing passwords safely (C#)

Storing passwords safely (C#)

57
Comments 26
6 min read
AI Security: How to Protect Your Projects with Hardened ModelKits
Cover image for AI Security: How to Protect Your Projects with Hardened ModelKits

AI Security: How to Protect Your Projects with Hardened ModelKits

45
Comments
7 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

1
Comments
3 min read
loading...