Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implement mTLS on AWS ALB with Self-Signed Certificates

Implement mTLS on AWS ALB with Self-Signed Certificates

13
Comments 1
5 min read
Issue 62 of AWS Cloud Security Weekly
Cover image for Issue 62 of AWS Cloud Security Weekly

Issue 62 of AWS Cloud Security Weekly

Comments
2 min read
AuthenticationHandler in ASPNET

AuthenticationHandler in ASPNET

12
Comments 1
3 min read
Best Cyber Security Certifications for Cloud Security Experts
Cover image for Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)
Cover image for Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Comments
5 min read
ACTING (like we care about) Security

ACTING (like we care about) Security

3
Comments
6 min read
Transaction Verification in Fintech Applications: A Step-By-Step Guide
Cover image for Transaction Verification in Fintech Applications: A Step-By-Step Guide

Transaction Verification in Fintech Applications: A Step-By-Step Guide

2
Comments
6 min read
Securing Data(Live event): A Guide to Microsoft DLP 🔒💻
Cover image for Securing Data(Live event): A Guide to Microsoft DLP 🔒💻

Securing Data(Live event): A Guide to Microsoft DLP 🔒💻

Comments
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐
Cover image for 🌐 SSL Certificates and How to Implement Them in Your Website 🔐

🌐 SSL Certificates and How to Implement Them in Your Website 🔐

2
Comments 1
3 min read
Admission Controllers in Kubernetes: OPA GateKeeper, Kyverno, and Azure Policy Add-on for AKS—Which One Wins? 🏆

Admission Controllers in Kubernetes: OPA GateKeeper, Kyverno, and Azure Policy Add-on for AKS—Which One Wins? 🏆

3
Comments
4 min read
AuthorizationEndpoint vs TokenEndpoint

AuthorizationEndpoint vs TokenEndpoint

3
Comments
3 min read
Kubernetes Security: Best Practices for Building a Secure Environment

Kubernetes Security: Best Practices for Building a Secure Environment

Comments
10 min read
Breaking a TOTP?
Cover image for Breaking a TOTP?

Breaking a TOTP?

Comments
5 min read
How to Use Shadow DOM and Honeypots to Deter Crawlers
Cover image for How to Use Shadow DOM and Honeypots to Deter Crawlers

How to Use Shadow DOM and Honeypots to Deter Crawlers

5
Comments
5 min read
Optimizing Keycloak Caches: Best Practices for Embedded and External Infinispan
Cover image for Optimizing Keycloak Caches: Best Practices for Embedded and External Infinispan

Optimizing Keycloak Caches: Best Practices for Embedded and External Infinispan

20
Comments 4
6 min read
AWS_WAF Bot Control Managed Rule expands bot detection capabilities to enhance web application security.

AWS_WAF Bot Control Managed Rule expands bot detection capabilities to enhance web application security.

1
Comments
1 min read
How Diffie-Hellman Key Exchange can Cause Availability Issues

How Diffie-Hellman Key Exchange can Cause Availability Issues

Comments
8 min read
Securing APIs with YARP: Authentication and Authorization in .NET 8 Minimal APIs
Cover image for Securing APIs with YARP: Authentication and Authorization in .NET 8 Minimal APIs

Securing APIs with YARP: Authentication and Authorization in .NET 8 Minimal APIs

12
Comments 1
4 min read
Securely Connecting Azure Container Apps to Azure OpenAI Using User Managed Identity

Securely Connecting Azure Container Apps to Azure OpenAI Using User Managed Identity

7
Comments
17 min read
Introducing Omni4J: Secure your Java code
Cover image for Introducing Omni4J: Secure your Java code

Introducing Omni4J: Secure your Java code

Comments
2 min read
Securing JavaScript Applications: Common Vulnerabilities and How to Avoid Them
Cover image for Securing JavaScript Applications: Common Vulnerabilities and How to Avoid Them

Securing JavaScript Applications: Common Vulnerabilities and How to Avoid Them

1
Comments
4 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus
Cover image for Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Comments
2 min read
GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices
Cover image for GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices

GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices

3
Comments 2
8 min read
Secure AWS API Gateway with IAM
Cover image for Secure AWS API Gateway with IAM

Secure AWS API Gateway with IAM

2
Comments
3 min read
LLM Adversarial Attacks: How Are Attackers Maliciously Prompting LLMs and Steps To Safeguard Your Applications
Cover image for LLM Adversarial Attacks: How Are Attackers Maliciously Prompting LLMs and Steps To Safeguard Your Applications

LLM Adversarial Attacks: How Are Attackers Maliciously Prompting LLMs and Steps To Safeguard Your Applications

3
Comments
20 min read
loading...