Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Is CSP Actually Helping with Your Security? 🤔
Cover image for Is CSP Actually Helping with Your Security? 🤔

Is CSP Actually Helping with Your Security? 🤔

57
Comments 5
5 min read
Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Keeping User-Uploaded Files Malware-Free: What’s Your Approach - Idea Validation

Comments
1 min read
Securing Postgres on Azure with a Private Endpoint

Securing Postgres on Azure with a Private Endpoint

14
Comments 2
4 min read
Secure Your Coding: Create an SSH Key on Mac or Windows
Cover image for Secure Your Coding: Create an SSH Key on Mac or Windows

Secure Your Coding: Create an SSH Key on Mac or Windows

7
Comments
4 min read
Cloud Resume Challenge pt 3: Exploring CosmoDB and Database Security

Cloud Resume Challenge pt 3: Exploring CosmoDB and Database Security

Comments
11 min read
OAuth 2.0 Authentication in Spring Boot: A Guide to Integrating Google and GitHub Login
Cover image for OAuth 2.0 Authentication in Spring Boot: A Guide to Integrating Google and GitHub Login

OAuth 2.0 Authentication in Spring Boot: A Guide to Integrating Google and GitHub Login

24
Comments
1 min read
Resolve Lambda URL Error - signature not match when using POST/PUT

Resolve Lambda URL Error - signature not match when using POST/PUT

9
Comments
4 min read
Keterampilan dan Pengetahuan Keamanan
Cover image for Keterampilan dan Pengetahuan Keamanan

Keterampilan dan Pengetahuan Keamanan

Comments
3 min read
AWS Network Firewall: A Simple Lab Setup Guide - ClickOps

AWS Network Firewall: A Simple Lab Setup Guide - ClickOps

7
Comments
8 min read
Cross-platform RAT deployed by weaponized 'requests' clone
Cover image for Cross-platform RAT deployed by weaponized 'requests' clone

Cross-platform RAT deployed by weaponized 'requests' clone

8
Comments
4 min read
Software: Our SOC 2 journey
Cover image for Software: Our SOC 2 journey

Software: Our SOC 2 journey

Comments
4 min read
Security news weekly round-up - 30th August 2024
Cover image for Security news weekly round-up - 30th August 2024

Security news weekly round-up - 30th August 2024

Comments
3 min read
JWT: The Secret Code for Web Security
Cover image for JWT: The Secret Code for Web Security

JWT: The Secret Code for Web Security

3
Comments
5 min read
🔒 Tip and Trick: MongoDB Security, Regulatory Compliance & Zero Trust 🔑
Cover image for 🔒 Tip and Trick: MongoDB Security, Regulatory Compliance & Zero Trust 🔑

🔒 Tip and Trick: MongoDB Security, Regulatory Compliance & Zero Trust 🔑

5
Comments
2 min read
Enhancing Amazon CloudFront Security with Response Headers
Cover image for Enhancing Amazon CloudFront Security with Response Headers

Enhancing Amazon CloudFront Security with Response Headers

1
Comments
6 min read
CI/CD Pipelines: Improve with Test Impact Analysis
Cover image for CI/CD Pipelines: Improve with Test Impact Analysis

CI/CD Pipelines: Improve with Test Impact Analysis

1
Comments
5 min read
Unveiling the Future of Authorization with Cerbos

Unveiling the Future of Authorization with Cerbos

Comments 1
3 min read
How Test Impact Analysis Enhances SDLC
Cover image for How Test Impact Analysis Enhances SDLC

How Test Impact Analysis Enhances SDLC

1
Comments
3 min read
Replay Attack - Let's learn
Cover image for Replay Attack - Let's learn

Replay Attack - Let's learn

8
Comments 1
4 min read
Security on AWS: A Brief Overview
Cover image for Security on AWS: A Brief Overview

Security on AWS: A Brief Overview

Comments
1 min read
Unveiling the Secrets of Cookies: A Fun and Informative Guide
Cover image for Unveiling the Secrets of Cookies: A Fun and Informative Guide

Unveiling the Secrets of Cookies: A Fun and Informative Guide

3
Comments
10 min read
How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life
Cover image for How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life

How I Hacked a Company Recruitment Test The Unexpected Tech Adventure of My College Life

16
Comments 2
2 min read
Beyond the Cloud: How On-Device AI Could Rescue Our Privacy!?
Cover image for Beyond the Cloud: How On-Device AI Could Rescue Our Privacy!?

Beyond the Cloud: How On-Device AI Could Rescue Our Privacy!?

12
Comments 1
2 min read
Stereotype of a Nigeria Hacker
Cover image for Stereotype of a Nigeria Hacker

Stereotype of a Nigeria Hacker

7
Comments 4
2 min read
Role-based access control with Clerk Organizations
Cover image for Role-based access control with Clerk Organizations

Role-based access control with Clerk Organizations

8
Comments 1
5 min read
loading...