Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
User-level auth in your Supabase API - Supaweek Day 2

User-level auth in your Supabase API - Supaweek Day 2

Comments
4 min read
Tips and Best Practices for API Authentication

Tips and Best Practices for API Authentication

Comments
10 min read
Simple HTTP Authentication: A Beginner’s Guide

Simple HTTP Authentication: A Beginner’s Guide

Comments
9 min read
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
Securing Your Next.js Application: The Basic Defenders (Security Headers)

Securing Your Next.js Application: The Basic Defenders (Security Headers)

6
Comments
8 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Benefits of Separating the Database and Other Services from the Web Application

Benefits of Separating the Database and Other Services from the Web Application

1
Comments 1
2 min read
Implementing Multi-Factor Authentication (MFA) in .NET Applications

Implementing Multi-Factor Authentication (MFA) in .NET Applications

11
Comments
2 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
Managing and Securing Access to AWS Resources Using IAM

Managing and Securing Access to AWS Resources Using IAM

Comments
6 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
Security in Programming: Best Practices to Keep Your Code and Systems Safe

Security in Programming: Best Practices to Keep Your Code and Systems Safe

1
Comments 2
3 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Memecoins: fun or fad? Why anonymity isn’t always a plus for investors

Memecoins: fun or fad? Why anonymity isn’t always a plus for investors

3
Comments
2 min read
Stop Ignoring This Key Angular Tool-Your App’s Security Depends on It

Stop Ignoring This Key Angular Tool-Your App’s Security Depends on It

2
Comments 2
3 min read
Why Security Testing is a Must-Have for Fintech Success

Why Security Testing is a Must-Have for Fintech Success

Comments
4 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Encrypting EBS Volumes of Amazon EC2 Instances Using Python

Encrypting EBS Volumes of Amazon EC2 Instances Using Python

1
Comments
8 min read
Configure EKS Cluster Security - Pod Security, Network Policies, Pod Identity

Configure EKS Cluster Security - Pod Security, Network Policies, Pod Identity

5
Comments
12 min read
loading...