Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Comments
8 min read
Proxmox Security Series:Securing Root Access
Cover image for Proxmox Security Series:Securing Root Access

Proxmox Security Series:Securing Root Access

6
Comments
5 min read
Enhancing Android App Security: Best Practices
Cover image for Enhancing Android App Security: Best Practices

Enhancing Android App Security: Best Practices

1
Comments 2
4 min read
AWS Security Group Rules
Cover image for AWS Security Group Rules

AWS Security Group Rules

9
Comments
2 min read
Introduction to JWT and OAuth 2.0
Cover image for Introduction to JWT and OAuth 2.0

Introduction to JWT and OAuth 2.0

3
Comments
4 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods
Cover image for Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Sumo Tatami x Serverspace

Sumo Tatami x Serverspace

Comments
2 min read
Securing Microservices with Spring Security: Implementing JWT
Cover image for Securing Microservices with Spring Security: Implementing JWT

Securing Microservices with Spring Security: Implementing JWT

43
Comments 1
14 min read
Ethical Hacking : Users password cracking

Ethical Hacking : Users password cracking

5
Comments
17 min read
Security news weekly round-up - 23rd August 2024
Cover image for Security news weekly round-up - 23rd August 2024

Security news weekly round-up - 23rd August 2024

2
Comments
4 min read
A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

4
Comments
7 min read
Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase
Cover image for Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

55
Comments
3 min read
Implementing Access Requests and Approvals in your App
Cover image for Implementing Access Requests and Approvals in your App

Implementing Access Requests and Approvals in your App

19
Comments
4 min read
How do I keep my digital life safe? (And you should too)
Cover image for How do I keep my digital life safe? (And you should too)

How do I keep my digital life safe? (And you should too)

3
Comments 5
5 min read
How SSL Certificates Work?
Cover image for How SSL Certificates Work?

How SSL Certificates Work?

Comments
2 min read
Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects
Cover image for Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

7
Comments
4 min read
How to Explore an Exposed .git
Cover image for How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯
Cover image for How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯

How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯

40
Comments 4
21 min read
Sign in with Apple for Node.js
Cover image for Sign in with Apple for Node.js

Sign in with Apple for Node.js

Comments
7 min read
PHP Tips | How to assymetric/symmetric encryption 🔒
Cover image for PHP Tips | How to assymetric/symmetric encryption 🔒

PHP Tips | How to assymetric/symmetric encryption 🔒

10
Comments
3 min read
Kaniko : Révolutionner vos builds Docker en toute sécurité
Cover image for Kaniko : Révolutionner vos builds Docker en toute sécurité

Kaniko : Révolutionner vos builds Docker en toute sécurité

1
Comments
5 min read
🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰
Cover image for 🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰

🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰

6
Comments
3 min read
VPC explained!

VPC explained!

Comments
9 min read
Alien biohazard approach to security
Cover image for Alien biohazard approach to security

Alien biohazard approach to security

Comments
2 min read
🔒 应用技巧: MongoDB安全、合规性与零信任 🔑
Cover image for 🔒 应用技巧: MongoDB安全、合规性与零信任 🔑

🔒 应用技巧: MongoDB安全、合规性与零信任 🔑

5
Comments
1 min read
loading...