Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
PHP security

PHP security

Comments
1 min read
Securing APIs: Techniques and Best Practices for Security

Securing APIs: Techniques and Best Practices for Security

4
Comments
5 min read
Security news weekly round-up - 27th December 2024

Security news weekly round-up - 27th December 2024

Comments
4 min read
Understanding Ports and Their Services: A Comprehensive Guide

Understanding Ports and Their Services: A Comprehensive Guide

1
Comments
2 min read
Tutorial: Credit card cracking explained — and how to prevent it

Tutorial: Credit card cracking explained — and how to prevent it

Comments
12 min read
Augment Cline and your LLM with up-to-date risk insight using CodeGate

Augment Cline and your LLM with up-to-date risk insight using CodeGate

4
Comments
1 min read
Authentication Vs Authorization In Backend Systems

Authentication Vs Authorization In Backend Systems

1
Comments 2
2 min read
Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Protecting Applications with Kong security plugins and using StatsD to monitor system states — A healthy camera story

Comments
39 min read
Autorização em Golang

Autorização em Golang

1
Comments
1 min read
Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

Ransomware in 2025: New Threats, AI-Driven Attacks, and How to Stay Safe

2
Comments
2 min read
A Phish on a Fork, no Chips

A Phish on a Fork, no Chips

15
Comments 1
4 min read
Leading Docker Adoption: A Senior Manager’s Perspective

Leading Docker Adoption: A Senior Manager’s Perspective

3
Comments
2 min read
How to configure CORS for Next.js

How to configure CORS for Next.js

6
Comments
7 min read
Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

1
Comments
5 min read
Master Network Security: Protect Your Digital World from Hidden Threats! 👾

Master Network Security: Protect Your Digital World from Hidden Threats! 👾

2
Comments
3 min read
Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Comments
5 min read
Token based Authentication using .NET Identity

Token based Authentication using .NET Identity

Comments
10 min read
Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

1
Comments
5 min read
GCP Workload Identity - Kubernetes Federation

GCP Workload Identity - Kubernetes Federation

1
Comments
4 min read
What does securing your AWS Environment look like in 2025?

What does securing your AWS Environment look like in 2025?

3
Comments
5 min read
Difference between AWS Security Groups and NACL

Difference between AWS Security Groups and NACL

Comments
4 min read
Network Security Groups (NSGs) and Firewalls

Network Security Groups (NSGs) and Firewalls

1
Comments
4 min read
Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

7
Comments
3 min read
OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

1
Comments
3 min read
Java, Taint, and SAST: What is it and why do we need it?

Java, Taint, and SAST: What is it and why do we need it?

Comments
8 min read
loading...