Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐
Cover image for 10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

Comments
3 min read
And When We Thought We Had Seen It All… Here Comes the Right Dev Tool for Our Toolbox
Cover image for And When We Thought We Had Seen It All… Here Comes the Right Dev Tool for Our Toolbox

And When We Thought We Had Seen It All… Here Comes the Right Dev Tool for Our Toolbox

1
Comments
3 min read
My Journey Creating a Hate Speech Detection App with Machine Learning
Cover image for My Journey Creating a Hate Speech Detection App with Machine Learning

My Journey Creating a Hate Speech Detection App with Machine Learning

1
Comments 2
3 min read
Security news weekly round-up - 18th April 2025
Cover image for Security news weekly round-up - 18th April 2025

Security news weekly round-up - 18th April 2025

1
Comments
5 min read
Understanding AWS Shared Responsibility and Security Principles

Understanding AWS Shared Responsibility and Security Principles

2
Comments 2
5 min read
Case Study: Building Enterprise-Grade AWS Infrastructure for Accolade
Cover image for Case Study: Building Enterprise-Grade AWS Infrastructure for Accolade

Case Study: Building Enterprise-Grade AWS Infrastructure for Accolade

4
Comments
3 min read
Calling calc.exe in Pure Shellcode by Walking the PEB

Calling calc.exe in Pure Shellcode by Walking the PEB

1
Comments
8 min read
Security News This Week: Coinbase Will Reimburse Customers Up to $400 Million After Data Breach

Security News This Week: Coinbase Will Reimburse Customers Up to $400 Million After Data Breach

Comments 3
1 min read
Mencegah SQL Injection di Prisma dengan Middleware dan withAccelerare

Mencegah SQL Injection di Prisma dengan Middleware dan withAccelerare

Comments
2 min read
How Messengers Actually Encrypt Messages (End-to-End)
Cover image for How Messengers Actually Encrypt Messages (End-to-End)

How Messengers Actually Encrypt Messages (End-to-End)

4
Comments 4
9 min read
Guards vs Interceptors no NestJS: quando usar cada um?

Guards vs Interceptors no NestJS: quando usar cada um?

Comments
3 min read
Implementing Content Security Policy for API Protection: A Comprehensive Guide
Cover image for Implementing Content Security Policy for API Protection: A Comprehensive Guide

Implementing Content Security Policy for API Protection: A Comprehensive Guide

Comments
12 min read
The Ultimate Guide to MITM Attack Prevention for API Security
Cover image for The Ultimate Guide to MITM Attack Prevention for API Security

The Ultimate Guide to MITM Attack Prevention for API Security

Comments
14 min read
SAST vs SCA: Choosing the Right Source Code Security Scanning Tools
Cover image for SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

2
Comments
5 min read
"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy
Cover image for "Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

"Enhanced"-end-to-end encryption (E-E2EE) to increase security and privacy

4
Comments 2
5 min read
Trust But Verify: Evaluating Security When Choosing Data Infrastructure Tools
Cover image for Trust But Verify: Evaluating Security When Choosing Data Infrastructure Tools

Trust But Verify: Evaluating Security When Choosing Data Infrastructure Tools

Comments
8 min read
GPG for Noobs
Cover image for GPG for Noobs

GPG for Noobs

9
Comments 7
5 min read
5 Secure Ways to Connect to EC2 Instances — Including SSH Key Recovery Made Easy!
Cover image for 5 Secure Ways to Connect to EC2 Instances — Including SSH Key Recovery Made Easy!

5 Secure Ways to Connect to EC2 Instances — Including SSH Key Recovery Made Easy!

9
Comments 3
3 min read
Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs
Cover image for Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs

Developer-Friendly Checklist to Make Your SaaS Product Enterprise-Ready — From SCIM to Billing APIs

1
Comments
3 min read
30 Day SOC Challenge -Day 7

30 Day SOC Challenge -Day 7

Comments
1 min read
A2A vs. MCP: Data Security Woes and a Subtle Fix
Cover image for A2A vs. MCP: Data Security Woes and a Subtle Fix

A2A vs. MCP: Data Security Woes and a Subtle Fix

1
Comments
4 min read
The Billion Laughs Bomb
Cover image for The Billion Laughs Bomb

The Billion Laughs Bomb

4
Comments
3 min read
How to Set Up a Secure Reverse Proxy with Nginx and Let's Encrypt
Cover image for How to Set Up a Secure Reverse Proxy with Nginx and Let's Encrypt

How to Set Up a Secure Reverse Proxy with Nginx and Let's Encrypt

3
Comments
2 min read
Active Directory Domain Services (Part 1)
Cover image for Active Directory Domain Services (Part 1)

Active Directory Domain Services (Part 1)

1
Comments
6 min read
Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed
Cover image for Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Comments
2 min read
loading...