Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

1
Comments
3 min read
Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

Implementing HTTP Request and Response Encryption in ASP.NET Core with Custom Attributes

1
Comments 2
4 min read
How to Debug Ansible Playbooks
Cover image for How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
7 firewall management best practices in 2024
Cover image for 7 firewall management best practices in 2024

7 firewall management best practices in 2024

Comments
4 min read
How to Reset Your Local Git Branch
Cover image for How to Reset Your Local Git Branch

How to Reset Your Local Git Branch

Comments
5 min read
Hacking (and securing) GraphQL

Hacking (and securing) GraphQL

2
Comments
13 min read
Leverage IP Data for Dynamic User Access Management 🌐
Cover image for Leverage IP Data for Dynamic User Access Management 🌐

Leverage IP Data for Dynamic User Access Management 🌐

46
Comments 1
4 min read
AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud
Cover image for AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

7
Comments
6 min read
Greatly improve your Health Endpoint with these tips!

Greatly improve your Health Endpoint with these tips!

1
Comments
2 min read
Why you should not mistype a website name ?
Cover image for Why you should not mistype a website name ?

Why you should not mistype a website name ?

12
Comments
1 min read
SSL Pinning in React Native for iOS and Android
Cover image for SSL Pinning in React Native for iOS and Android

SSL Pinning in React Native for iOS and Android

33
Comments
6 min read
The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

Comments
2 min read
The Dynamic Application Security Testing Process: A Step-by-Step Guide

The Dynamic Application Security Testing Process: A Step-by-Step Guide

Comments
4 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
How to Discard Local Changes in Git
Cover image for How to Discard Local Changes in Git

How to Discard Local Changes in Git

5
Comments
5 min read
Guide to Writing Security Technology Blog Articles
Cover image for Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

2
Comments
1 min read
Understanding Kubernetes Jobs
Cover image for Understanding Kubernetes Jobs

Understanding Kubernetes Jobs

4
Comments
5 min read
Securing external-dns: Encrypting TXT Registry Records

Securing external-dns: Encrypting TXT Registry Records

1
Comments 1
5 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

8
Comments
4 min read
Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

1
Comments
3 min read
Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!
Cover image for Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Comments
5 min read
Learn about basic Authentication

Learn about basic Authentication

3
Comments
4 min read
Ten Must-Have Endpoint Security Tools for 2025

Ten Must-Have Endpoint Security Tools for 2025

Comments
2 min read
K8s Plugins For Solid Security

K8s Plugins For Solid Security

Comments
2 min read
Hidden Risk Of Relying On Labels In Kubernetes Security
Cover image for Hidden Risk Of Relying On Labels In Kubernetes Security

Hidden Risk Of Relying On Labels In Kubernetes Security

Comments
2 min read
loading...