Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
Secure AWS VPC using Public and Private Subnets
Cover image for Secure AWS VPC using Public and Private Subnets

Secure AWS VPC using Public and Private Subnets

4
Comments
10 min read
The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments
Cover image for The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

2
Comments 1
4 min read
Looking for some feedback on my team's new open-source secrets vault project.

Looking for some feedback on my team's new open-source secrets vault project.

2
Comments 2
1 min read
Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

5
Comments
4 min read
Turning a Customer Security Concern into a Feature
Cover image for Turning a Customer Security Concern into a Feature

Turning a Customer Security Concern into a Feature

4
Comments
2 min read
picoCTF "Breadth" Walkthrough
Cover image for picoCTF "Breadth" Walkthrough

picoCTF "Breadth" Walkthrough

Comments
5 min read
AI Engineer's Tool Review: Guardrails AI
Cover image for AI Engineer's Tool Review: Guardrails AI

AI Engineer's Tool Review: Guardrails AI

Comments
1 min read
The Role of Machine Learning in Enhancing Network Security
Cover image for The Role of Machine Learning in Enhancing Network Security

The Role of Machine Learning in Enhancing Network Security

1
Comments
3 min read
CCSP Study Guide: How to Prepare for the CCSP Exam
Cover image for CCSP Study Guide: How to Prepare for the CCSP Exam

CCSP Study Guide: How to Prepare for the CCSP Exam

Comments 3
5 min read
🍯 Honeypot field: an easy to implement React security technique

🍯 Honeypot field: an easy to implement React security technique

1
Comments
2 min read
Cloud Security with AWS IAM
Cover image for Cloud Security with AWS IAM

Cloud Security with AWS IAM

Comments
1 min read
Ensuring Secure and Efficient Banking Apps through Rigorous Testing

Ensuring Secure and Efficient Banking Apps through Rigorous Testing

4
Comments
5 min read
Secure Video Conferencing and Encryption is the Future
Cover image for Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
Two Years in the Vault: 4 Best Practices 🔒
Cover image for Two Years in the Vault: 4 Best Practices 🔒

Two Years in the Vault: 4 Best Practices 🔒

11
Comments
9 min read
What is a Reverse Proxy? How It Works and Why You Need It
Cover image for What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

5
Comments
1 min read
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

5
Comments
2 min read
Introduction to DevSecOps
Cover image for Introduction to DevSecOps

Introduction to DevSecOps

40
Comments 3
3 min read
What Is security.txt and How Can It Help Improve Website Security?

What Is security.txt and How Can It Help Improve Website Security?

2
Comments 1
3 min read
🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required
Cover image for 🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

10
Comments 2
3 min read
Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Comments
3 min read
CSRF Protection in PHP

CSRF Protection in PHP

2
Comments
3 min read
Prevent SSRF in Laravel: Guide & Example Code
Cover image for Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

1
Comments
3 min read
Preventing File Inclusion Vulnerabilities in Laravel Applications
Cover image for Preventing File Inclusion Vulnerabilities in Laravel Applications

Preventing File Inclusion Vulnerabilities in Laravel Applications

2
Comments 1
2 min read
loading...