Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why GRC Should Matter to Every Developer, Not Just Compliance Teams

Why GRC Should Matter to Every Developer, Not Just Compliance Teams

Comments
2 min read
OAuth2 Explained Simply — For Developers Who Hate Overcomplicated Docs
Cover image for OAuth2 Explained Simply — For Developers Who Hate Overcomplicated Docs

OAuth2 Explained Simply — For Developers Who Hate Overcomplicated Docs

2
Comments
6 min read
How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?
Cover image for How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?

How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?

Comments
5 min read
The "S" in MCP Stands for Security
Cover image for The "S" in MCP Stands for Security

The "S" in MCP Stands for Security

2
Comments
3 min read
SecurePasswordCrypt: Secure AES-GCM Encryption & Password Hashing for .NET Projects
Cover image for SecurePasswordCrypt: Secure AES-GCM Encryption & Password Hashing for .NET Projects

SecurePasswordCrypt: Secure AES-GCM Encryption & Password Hashing for .NET Projects

4
Comments 1
2 min read
🧠🥷MCP Security (choose safe MCP and check MCP safety)🛡️
Cover image for 🧠🥷MCP Security (choose safe MCP and check MCP safety)🛡️

🧠🥷MCP Security (choose safe MCP and check MCP safety)🛡️

6
Comments 1
4 min read
Edge Computing: The Future of Cloud & DevOps

Edge Computing: The Future of Cloud & DevOps

7
Comments 1
3 min read
X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

1
Comments
2 min read
Enable Aurora logs for security audits
Cover image for Enable Aurora logs for security audits

Enable Aurora logs for security audits

3
Comments
4 min read
From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

Comments 3
3 min read
How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

Comments
6 min read
Understanding Bcrypt's Work Factor and Choosing the Right Value

Understanding Bcrypt's Work Factor and Choosing the Right Value

5
Comments
5 min read
How to configure passwordless authentication using Ansible

How to configure passwordless authentication using Ansible

5
Comments
2 min read
PEM, DER, PFX, CER, CRT, and CSR for connecting to servers
Cover image for PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

1
Comments
4 min read
GemCity TECH Mini-Conference
Cover image for GemCity TECH Mini-Conference

GemCity TECH Mini-Conference

6
Comments 1
4 min read
Security news weekly round-up - 4th April 2025
Cover image for Security news weekly round-up - 4th April 2025

Security news weekly round-up - 4th April 2025

2
Comments
3 min read
Access Control and Zero-Knowledge
Cover image for Access Control and Zero-Knowledge

Access Control and Zero-Knowledge

Comments
4 min read
Understanding CVE-2025-29927 - The Next.js Vulnerability
Cover image for Understanding CVE-2025-29927 - The Next.js Vulnerability

Understanding CVE-2025-29927 - The Next.js Vulnerability

1
Comments
3 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments 1
2 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Input/Output Validation: Best Practices for API Communication
Cover image for Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

1
Comments
10 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit
Cover image for Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
The Hack That Made People Rich.....in Subway Surfers
Cover image for The Hack That Made People Rich.....in Subway Surfers

The Hack That Made People Rich.....in Subway Surfers

2
Comments 2
4 min read
loading...