Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Safer Container Runtime
Cover image for A Safer Container Runtime

A Safer Container Runtime

Comments
4 min read
Revolutionize Your Secret Management with Infisical: The Open-Source Solution You've Been Waiting For!

Revolutionize Your Secret Management with Infisical: The Open-Source Solution You've Been Waiting For!

Comments
3 min read
Cloud vs. On-Prem Storage: The Hidden Costs No One Talks About

Cloud vs. On-Prem Storage: The Hidden Costs No One Talks About

3
Comments
3 min read
New Next.js Middleware Vulnerability – How Bad Is It?
Cover image for New Next.js Middleware Vulnerability – How Bad Is It?

New Next.js Middleware Vulnerability – How Bad Is It?

4
Comments
2 min read
Adding Permissions in your application

Adding Permissions in your application

Comments
1 min read
Securing My AWS EC2: A Journey Through IAM and SSH Struggles

Securing My AWS EC2: A Journey Through IAM and SSH Struggles

Comments
3 min read
The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats
Cover image for The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats

The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats

Comments
3 min read
Automating secure CloudWatch Alarms with CDK Monitoring Constructs and encrypted SNS
Cover image for Automating secure CloudWatch Alarms with CDK Monitoring Constructs and encrypted SNS

Automating secure CloudWatch Alarms with CDK Monitoring Constructs and encrypted SNS

3
Comments
4 min read
Understanding TRON In Blockchain : Algorithms and Delegates

Understanding TRON In Blockchain : Algorithms and Delegates

Comments
9 min read
SQL Injection
Cover image for SQL Injection

SQL Injection

Comments
1 min read
Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use
Cover image for Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

3
Comments
7 min read
Comprehensive Guide to JWT Implementation and Security Best Practices

Comprehensive Guide to JWT Implementation and Security Best Practices

1
Comments
5 min read
🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game
Cover image for 🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game

🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game

63
Comments 22
4 min read
Explorando e Mitigando XSS em Formulários com React e Node.js

Explorando e Mitigando XSS em Formulários com React e Node.js

Comments 1
3 min read
Building Secure Authentication in Go with GoFrame GToken 🔐

Building Secure Authentication in Go with GoFrame GToken 🔐

1
Comments
6 min read
Database Security Made Simple: Essential Practices
Cover image for Database Security Made Simple: Essential Practices

Database Security Made Simple: Essential Practices

Comments
2 min read
Oops, My Database Got Hacked
Cover image for Oops, My Database Got Hacked

Oops, My Database Got Hacked

Comments
4 min read
Coding on a Vibe? Why Skipping the Fundamentals Can Wreck Your Project

Coding on a Vibe? Why Skipping the Fundamentals Can Wreck Your Project

6
Comments
3 min read
Edge Security Showdown: Vercel Firewall vs. Cloudflare - Protecting Your Modern Web App
Cover image for Edge Security Showdown: Vercel Firewall vs. Cloudflare - Protecting Your Modern Web App

Edge Security Showdown: Vercel Firewall vs. Cloudflare - Protecting Your Modern Web App

8
Comments
6 min read
Introducing Fingerprinting API – Your All-in-One Bot Detection & Fraud Prevention Solution
Cover image for Introducing Fingerprinting API – Your All-in-One Bot Detection & Fraud Prevention Solution

Introducing Fingerprinting API – Your All-in-One Bot Detection & Fraud Prevention Solution

2
Comments
1 min read
Stop Storing Plain Text Passwords! Use Bcrypt for Security

Stop Storing Plain Text Passwords! Use Bcrypt for Security

Comments
2 min read
Blockchain and Digital Signatures: A New Era of Security

Blockchain and Digital Signatures: A New Era of Security

Comments
2 min read
Context-Aware Text Sanitization in JavaScript: Best Practices for Modern Web Apps
Cover image for Context-Aware Text Sanitization in JavaScript: Best Practices for Modern Web Apps

Context-Aware Text Sanitization in JavaScript: Best Practices for Modern Web Apps

1
Comments
4 min read
High-Performance Secure Networking with RIOC
Cover image for High-Performance Secure Networking with RIOC

High-Performance Secure Networking with RIOC

Comments
13 min read
🔐 Understanding SAML, OAuth 2.0 and OpenID Connect
Cover image for 🔐 Understanding SAML, OAuth 2.0 and OpenID Connect

🔐 Understanding SAML, OAuth 2.0 and OpenID Connect

2
Comments
5 min read
loading...