Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀
Cover image for Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀

Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀

9
Comments 2
3 min read
JWT vs PASETO: A Comprehensive Comparison
Cover image for JWT vs PASETO: A Comprehensive Comparison

JWT vs PASETO: A Comprehensive Comparison

Comments
3 min read
🔒 Beginner’s Guide to AWS IAM Hardening

🔒 Beginner’s Guide to AWS IAM Hardening

Comments
8 min read
📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐
Cover image for 📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

Comments
3 min read
I scanned 37 sites from Hacker News for leaked secrets. One had 6.

I scanned 37 sites from Hacker News for leaked secrets. One had 6.

Comments
2 min read
Building a FinTech Approval System with Symfony 7.4
Cover image for Building a FinTech Approval System with Symfony 7.4

Building a FinTech Approval System with Symfony 7.4

Comments
8 min read
n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

Comments
5 min read
[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

Comments
2 min read
Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Comments
3 min read
Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Comments
1 min read
Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Comments
9 min read
Day 12 — React2Shell CVE (The Mines)
Cover image for Day 12 — React2Shell CVE (The Mines)

Day 12 — React2Shell CVE (The Mines)

Comments
2 min read
How to Quickly Inspect & Decode JWTs in Postman (The Right Way)
Cover image for How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

Comments
3 min read
Fortifying Your Data: Row-Level Security in Power BI.
Cover image for Fortifying Your Data: Row-Level Security in Power BI.

Fortifying Your Data: Row-Level Security in Power BI.

Comments
4 min read
Rust Weekly Log: Crypto Foundations & Clean Architecture

Rust Weekly Log: Crypto Foundations & Clean Architecture

Comments
1 min read
The Perfect Grammar That Defeats Us: Why AI Doesn't Need to Be Smart to Win
Cover image for The Perfect Grammar That Defeats Us: Why AI Doesn't Need to Be Smart to Win

The Perfect Grammar That Defeats Us: Why AI Doesn't Need to Be Smart to Win

Comments
6 min read
Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity
Cover image for Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Comments
2 min read
# Regra de segurança no Android nativo com SharedPreferences

# Regra de segurança no Android nativo com SharedPreferences

Comments
2 min read
Sonarqube Nedir

Sonarqube Nedir

Comments
4 min read
Experimental Hono auth npm package

Experimental Hono auth npm package

Comments
2 min read
Unlocking Web Security: Mastering Authentication in the Digital Age

Unlocking Web Security: Mastering Authentication in the Digital Age

Comments
2 min read
Modernizing Enterprise IT: The Unified Internal Portal
Cover image for Modernizing Enterprise IT: The Unified Internal Portal

Modernizing Enterprise IT: The Unified Internal Portal

Comments
3 min read
Beyond the Wire: Encrypting Messages Where the Message Never Exists

Beyond the Wire: Encrypting Messages Where the Message Never Exists

Comments
3 min read
How to Prevent AI Agents from Draining Crypto Wallets
Cover image for How to Prevent AI Agents from Draining Crypto Wallets

How to Prevent AI Agents from Draining Crypto Wallets

Comments
7 min read
Why AWS Delegated Administrators Are Essential for AWS Multi-Account Architectures

Why AWS Delegated Administrators Are Essential for AWS Multi-Account Architectures

Comments
10 min read
loading...