Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS
Cover image for Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

1
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots
Cover image for SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

1
Comments
10 min read
How to Prevent SQL Injection
Cover image for How to Prevent SQL Injection

How to Prevent SQL Injection

1
Comments
2 min read
Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Comments
1 min read
AI Security: The Next Frontier in Infrastructure Protection

AI Security: The Next Frontier in Infrastructure Protection

Comments
4 min read
Azure DevOps Security Best Practices
Cover image for Azure DevOps Security Best Practices

Azure DevOps Security Best Practices

Comments
14 min read
How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

Comments
1 min read
Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Comments
1 min read
Cloud Security vs Traditional Security: Key Differences

Cloud Security vs Traditional Security: Key Differences

Comments
4 min read
Mastering MySQL Security: Key Steps to Protect Your Database
Cover image for Mastering MySQL Security: Key Steps to Protect Your Database

Mastering MySQL Security: Key Steps to Protect Your Database

Comments
2 min read
Behind That 'Login with Google' Button💡

Behind That 'Login with Google' Button💡

Comments
6 min read
The Urgent Need for You to Be Security Conscious
Cover image for The Urgent Need for You to Be Security Conscious

The Urgent Need for You to Be Security Conscious

Comments
2 min read
Implementing multi-tenancy into a Supabase app with Clerk
Cover image for Implementing multi-tenancy into a Supabase app with Clerk

Implementing multi-tenancy into a Supabase app with Clerk

18
Comments
8 min read
🔐 Building Trust in Web3: Security, Transparency & Execution Matter
Cover image for 🔐 Building Trust in Web3: Security, Transparency & Execution Matter

🔐 Building Trust in Web3: Security, Transparency & Execution Matter

Comments
1 min read
How Unicorn Scale Company Detect Millions of Violated Ecommerce Product Everyday
Cover image for How Unicorn Scale Company Detect Millions of Violated Ecommerce Product Everyday

How Unicorn Scale Company Detect Millions of Violated Ecommerce Product Everyday

Comments
6 min read
Clerk integrates with a Next.js application using Supabase
Cover image for Clerk integrates with a Next.js application using Supabase

Clerk integrates with a Next.js application using Supabase

8
Comments 1
7 min read
How Clerk integrates with Supabase
Cover image for How Clerk integrates with Supabase

How Clerk integrates with Supabase

4
Comments 1
6 min read
Autenticação e Autorização

Autenticação e Autorização

Comments
2 min read
Securing Multi-Tier Applications with .NET 8: Role-Based Authorization Best Practices
Cover image for Securing Multi-Tier Applications with .NET 8: Role-Based Authorization Best Practices

Securing Multi-Tier Applications with .NET 8: Role-Based Authorization Best Practices

5
Comments
3 min read
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
Cover image for 🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

6
Comments 5
4 min read
How to Defend Against Bot Attacks with SafeLine WAF

How to Defend Against Bot Attacks with SafeLine WAF

5
Comments
2 min read
mKingdom Tryhackme Writeup
Cover image for mKingdom Tryhackme Writeup

mKingdom Tryhackme Writeup

Comments
6 min read
loading...