Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
5 Reasons Why IT Security Tools Fall Short To Secure the Industry
Cover image for 5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments 1
4 min read
Access Microsoft 365 resources from custom on premise application - setup
Cover image for Access Microsoft 365 resources from custom on premise application - setup

Access Microsoft 365 resources from custom on premise application - setup

2
Comments 1
9 min read
AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

3
Comments
2 min read
Security Configuration in HTTP headers
Cover image for Security Configuration in HTTP headers

Security Configuration in HTTP headers

Comments
2 min read
Kubernetes Service Accounts: Guide
Cover image for Kubernetes Service Accounts: Guide

Kubernetes Service Accounts: Guide

8
Comments 1
10 min read
Understanding Namespaces in Kubernetes
Cover image for Understanding Namespaces in Kubernetes

Understanding Namespaces in Kubernetes

6
Comments
6 min read
Kubernetes Network Policies
Cover image for Kubernetes Network Policies

Kubernetes Network Policies

5
Comments
6 min read
Sidecar Containers in Kubernetes
Cover image for Sidecar Containers in Kubernetes

Sidecar Containers in Kubernetes

Comments
7 min read
Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners
Cover image for Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Comments
13 min read
AWS Security Group vs NACL: What’s the Difference?

AWS Security Group vs NACL: What’s the Difference?

5
Comments
2 min read
I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users
Cover image for I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

46
Comments 5
7 min read
Forward vs Reverse Proxies: Understanding Their Role in Network Architecture
Cover image for Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Comments
3 min read
Horizontal privilege escalation

Horizontal privilege escalation

1
Comments
1 min read
Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline
Cover image for Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline

Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline

1
Comments
3 min read
Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails
Cover image for Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails

Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails

2
Comments
6 min read
Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️
Cover image for Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Comments
2 min read
A Quick Look at the Problem of Data Poisoning in Language Models
Cover image for A Quick Look at the Problem of Data Poisoning in Language Models

A Quick Look at the Problem of Data Poisoning in Language Models

1
Comments
2 min read
AWS Session Manager vs SSH
Cover image for AWS Session Manager vs SSH

AWS Session Manager vs SSH

1
Comments
5 min read
🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

32
Comments 3
3 min read
Session Management, Tokens & Refresh Tokens

Session Management, Tokens & Refresh Tokens

3
Comments
4 min read
Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security
Cover image for Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Comments
3 min read
Is Your Phone Hacked? Signs and Steps to Take
Cover image for Is Your Phone Hacked? Signs and Steps to Take

Is Your Phone Hacked? Signs and Steps to Take

Comments
3 min read
Best Practices for Working with Docker: Networking, Security, and Optimization
Cover image for Best Practices for Working with Docker: Networking, Security, and Optimization

Best Practices for Working with Docker: Networking, Security, and Optimization

12
Comments
6 min read
Ansible Vault Cheatsheet: Mastering Secure Configuration Management

Ansible Vault Cheatsheet: Mastering Secure Configuration Management

3
Comments
5 min read
Security news weekly round-up - 25th October 2024
Cover image for Security news weekly round-up - 25th October 2024

Security news weekly round-up - 25th October 2024

1
Comments
5 min read
loading...