Forem

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

Comments
1 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

US Cybersecurity Agency Places Election Security Staff Who Collaborated with States on Leave

1
Comments
4 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
4 min read
How to Run Models Locally: A Step-by-Step Guide for Non-Techies
Cover image for How to Run Models Locally: A Step-by-Step Guide for Non-Techies

How to Run Models Locally: A Step-by-Step Guide for Non-Techies

2
Comments
3 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises
Cover image for Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks
Cover image for How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
Automated Penetration Testing: A Guide to Domain Collection
Cover image for Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
Avoiding Production Disasters with npm ci: The Key to Stable Deployments
Cover image for Avoiding Production Disasters with npm ci: The Key to Stable Deployments

Avoiding Production Disasters with npm ci: The Key to Stable Deployments

7
Comments 1
3 min read
The Problem with Traditional Security Tools

The Problem with Traditional Security Tools

Comments
2 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.
Cover image for Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI
Cover image for Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Why we as Europeans need to ditch US tech and how

Why we as Europeans need to ditch US tech and how

2
Comments 4
4 min read
Code Reviews with AI: a Developer Guide
Cover image for Code Reviews with AI: a Developer Guide

Code Reviews with AI: a Developer Guide

5
Comments 3
10 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
What is Zero Trust Security?
Cover image for What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 2
2 min read
Security news weekly round-up - 7th February 2025
Cover image for Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
Intro to Service Workers: Best Practices & Threat Mitigation
Cover image for Intro to Service Workers: Best Practices & Threat Mitigation

Intro to Service Workers: Best Practices & Threat Mitigation

2
Comments 1
4 min read
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
Best Practices for Storing Access Tokens in the Browser
Cover image for Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

1
Comments
2 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

5
Comments
4 min read
Why Authorization Matters and How Cerbos Revolutionizes It
Cover image for Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
loading...