Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Steps to fix package security vulnerabilities in your JS project

Steps to fix package security vulnerabilities in your JS project

3
Comments
3 min read
Docker Security: Best Practices, Configurations, and Real-Life Scenarios
Cover image for Docker Security: Best Practices, Configurations, and Real-Life Scenarios

Docker Security: Best Practices, Configurations, and Real-Life Scenarios

Comments
5 min read
Unlocking the Power of Linux Device Drivers
Cover image for Unlocking the Power of Linux Device Drivers

Unlocking the Power of Linux Device Drivers

Comments 1
7 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀
Cover image for Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀

Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀

Comments 2
2 min read
I Survived a Massive DDoS Attack and Made My Server Bulletproof
Cover image for I Survived a Massive DDoS Attack and Made My Server Bulletproof

I Survived a Massive DDoS Attack and Made My Server Bulletproof

8
Comments 1
2 min read
How to avoid bricking your device during update rollouts

How to avoid bricking your device during update rollouts

Comments
2 min read
SAST, DAST, and IAST: Approaches to Testing Application Security
Cover image for SAST, DAST, and IAST: Approaches to Testing Application Security

SAST, DAST, and IAST: Approaches to Testing Application Security

6
Comments 2
6 min read
How to create an image authentication system with python streamlit and canva!
Cover image for How to create an image authentication system with python streamlit and canva!

How to create an image authentication system with python streamlit and canva!

2
Comments 2
2 min read
Ensure a robust and secure environment

Ensure a robust and secure environment

Comments
2 min read
Day 6/90: File Permissions and Access Control Lists in Linux 🔐 #90DaysOfDevOps

Day 6/90: File Permissions and Access Control Lists in Linux 🔐 #90DaysOfDevOps

Comments
2 min read
Understanding SafeTensors: A Secure Alternative to Pickle for ML Models
Cover image for Understanding SafeTensors: A Secure Alternative to Pickle for ML Models

Understanding SafeTensors: A Secure Alternative to Pickle for ML Models

4
Comments
4 min read
How to mitigate attacks on WordPress when running under a full CDN like Cloudflare

How to mitigate attacks on WordPress when running under a full CDN like Cloudflare

Comments
7 min read
An Overview of the Kalp Studio Authentication

An Overview of the Kalp Studio Authentication

5
Comments
4 min read
Web Development Legal Rules!

Web Development Legal Rules!

Comments
1 min read
SQL Injection: Types, Examples & Prevention Cheat Sheet
Cover image for SQL Injection: Types, Examples & Prevention Cheat Sheet

SQL Injection: Types, Examples & Prevention Cheat Sheet

Comments
1 min read
Announcing Integration between Apache APISIX and open-appsec WAF

Announcing Integration between Apache APISIX and open-appsec WAF

6
Comments
12 min read
Apache APISIX Integrates with open-appsec WAF
Cover image for Apache APISIX Integrates with open-appsec WAF

Apache APISIX Integrates with open-appsec WAF

6
Comments
12 min read
Issue 67 of AWS Cloud Security Weekly
Cover image for Issue 67 of AWS Cloud Security Weekly

Issue 67 of AWS Cloud Security Weekly

1
Comments
1 min read
🚀 Enhancing OAuth Security & User Experience 🔒
Cover image for 🚀 Enhancing OAuth Security & User Experience 🔒

🚀 Enhancing OAuth Security & User Experience 🔒

Comments
1 min read
Artificial Intelligence and Coding
Cover image for Artificial Intelligence and Coding

Artificial Intelligence and Coding

Comments 6
1 min read
🔑 JWT Tokens VS Session Cookies in Authentication and Authorization 🍪
Cover image for 🔑 JWT Tokens VS Session Cookies in Authentication and Authorization 🍪

🔑 JWT Tokens VS Session Cookies in Authentication and Authorization 🍪

3
Comments
5 min read
Crucial API Security Guidelines for Developers🔒
Cover image for Crucial API Security Guidelines for Developers🔒

Crucial API Security Guidelines for Developers🔒

1
Comments
4 min read
How to Use the workflow_dispatch Event for Manual Triggers

How to Use the workflow_dispatch Event for Manual Triggers

5
Comments
2 min read
What are ITDR in cyber security?

What are ITDR in cyber security?

Comments
1 min read
loading...