Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Multi-Factor Authentication: A Deep Dive into MFA
Cover image for Understanding Multi-Factor Authentication: A Deep Dive into MFA

Understanding Multi-Factor Authentication: A Deep Dive into MFA

1
Comments
4 min read
Securing Software Development with Secrets Vaults: A Comprehensive Guide
Cover image for Securing Software Development with Secrets Vaults: A Comprehensive Guide

Securing Software Development with Secrets Vaults: A Comprehensive Guide

Comments
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
Cover image for Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
Understanding CSRF Attacks: Safeguarding Your Web Applications
Cover image for Understanding CSRF Attacks: Safeguarding Your Web Applications

Understanding CSRF Attacks: Safeguarding Your Web Applications

1
Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type
Cover image for OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide
Cover image for Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Comments
2 min read
Access Token or ID Token? Which to Use and Why?
Cover image for Access Token or ID Token? Which to Use and Why?

Access Token or ID Token? Which to Use and Why?

Comments
3 min read
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration
Cover image for RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

Comments
3 min read
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity
Cover image for Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Comments
3 min read
OAuth2: Understanding the Authorization Code Grant Type
Cover image for OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
JSON Web Tokens (JWTs): A Comprehensive Guide
Cover image for JSON Web Tokens (JWTs): A Comprehensive Guide

JSON Web Tokens (JWTs): A Comprehensive Guide

Comments
3 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security
Cover image for Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
OAuth2 Demystified: An Introduction to Secure Authorization
Cover image for OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
Understanding the Differences Between Authentication and Authorization
Cover image for Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
What does CORS really do? 🤔

What does CORS really do? 🤔

1
Comments
3 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments 1
2 min read
How to Use ENV variables in GitHub Actions

How to Use ENV variables in GitHub Actions

6
Comments
3 min read
Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup
Cover image for Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Comments
5 min read
Building a Secure Event Booking App with FACEIO and Svelte
Cover image for Building a Secure Event Booking App with FACEIO and Svelte

Building a Secure Event Booking App with FACEIO and Svelte

6
Comments
9 min read
Issue 68 of AWS Cloud Security Weekly
Cover image for Issue 68 of AWS Cloud Security Weekly

Issue 68 of AWS Cloud Security Weekly

2
Comments
2 min read
The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses
Cover image for The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses

The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses

10
Comments
8 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

1
Comments
4 min read
APIs and Security Best Practices: JavaScript and Python Examples
Cover image for APIs and Security Best Practices: JavaScript and Python Examples

APIs and Security Best Practices: JavaScript and Python Examples

1
Comments 1
5 min read
Essential SQL Database Security Practices to Protect Your Data

Essential SQL Database Security Practices to Protect Your Data

Comments
4 min read
How To Find Zombie Hosts With Nmap?
Cover image for How To Find Zombie Hosts With Nmap?

How To Find Zombie Hosts With Nmap?

Comments
2 min read
loading...