Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Safe and Sound: Overview of Security and Governance in Cloud Migration
Cover image for Safe and Sound: Overview of Security and Governance in Cloud Migration

Safe and Sound: Overview of Security and Governance in Cloud Migration

4
Comments 1
4 min read
Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

Hashicorp Vault Agent Tutorial: Generating .env from Vault Secrets

5
Comments
3 min read
How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization
Cover image for How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization

How-to deploy GuardDuty from dedicated account on multi-accounts and multi-regions organization

2
Comments
2 min read
Block direct access to CloudFront origins with custom headers and AWS WAF
Cover image for Block direct access to CloudFront origins with custom headers and AWS WAF

Block direct access to CloudFront origins with custom headers and AWS WAF

34
Comments 1
7 min read
Common Cybersecurity Misconceptions and How to Avoid Them
Cover image for Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
Open Redirects in Laravel: A Critical Guide to Secure Your Application
Cover image for Open Redirects in Laravel: A Critical Guide to Secure Your Application

Open Redirects in Laravel: A Critical Guide to Secure Your Application

2
Comments
3 min read
Cybersecurity Understanding the OWASP® Top 10 Security Threats

Cybersecurity Understanding the OWASP® Top 10 Security Threats

1
Comments
1 min read
How can you secure microservices architecture using AWS services?
Cover image for How can you secure microservices architecture using AWS services?

How can you secure microservices architecture using AWS services?

1
Comments
2 min read
Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒
Cover image for Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

1
Comments
2 min read
Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Comments
6 min read
Getting Started with AWS Security Credentials and CLI 🧑‍💻

Getting Started with AWS Security Credentials and CLI 🧑‍💻

Comments
2 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
What are the main challenges in SaaS product development

What are the main challenges in SaaS product development

Comments
2 min read
I am a wall - Call me a VPC
Cover image for I am a wall - Call me a VPC

I am a wall - Call me a VPC

2
Comments 2
3 min read
Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work
Cover image for Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Comments
5 min read
Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

1
Comments
3 min read
API Authentication: Part I. Basic Authentication
Cover image for API Authentication: Part I. Basic Authentication

API Authentication: Part I. Basic Authentication

Comments
11 min read
The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

Comments
3 min read
Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.
Cover image for Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.

Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.

1
Comments
3 min read
Can We Truly Trust VPNs and Anonymity Tools?

Can We Truly Trust VPNs and Anonymity Tools?

6
Comments 1
2 min read
How Java Development Services Ensure Robust Security for Enterprise-Level Applications

How Java Development Services Ensure Robust Security for Enterprise-Level Applications

Comments
7 min read
Will AI be banned? A game theory analysis.

Will AI be banned? A game theory analysis.

3
Comments
20 min read
MitM Attacks in Laravel: Prevention and Coding Examples
Cover image for MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity
Cover image for Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

18
Comments
1 min read
loading...