Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Don't use JWT for Authorization!

Don't use JWT for Authorization!

19
Comments 11
5 min read
Building a Security System, with motion detection and time based settings using Arduino

Building a Security System, with motion detection and time based settings using Arduino

Comments
4 min read
Security news weekly round-up - 13th December 2024

Security news weekly round-up - 13th December 2024

Comments
3 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Comments
7 min read
Stop AI coding assistants from leaking your secrets

Stop AI coding assistants from leaking your secrets

4
Comments
1 min read
Docker Scout: Your Container Security Companion - A Developer's Guide

Docker Scout: Your Container Security Companion - A Developer's Guide

3
Comments 1
3 min read
Are millions of accounts vulnerable due to Google's OAuth Flaw?

Are millions of accounts vulnerable due to Google's OAuth Flaw?

11
Comments 1
9 min read
Master Linux File Types While Your Coffee Brews

Master Linux File Types While Your Coffee Brews

4
Comments
5 min read
Changing an established SSH connection without disconnecting

Changing an established SSH connection without disconnecting

Comments 1
4 min read
Implementing passwordless sign-in flow with email in Cognito

Implementing passwordless sign-in flow with email in Cognito

4
Comments
5 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze

Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze

9
Comments 1
6 min read
Rootless Containers: What They Are and Why You Should Use Them

Rootless Containers: What They Are and Why You Should Use Them

Comments
3 min read
How to Create a Workspace in Metasploit Console

How to Create a Workspace in Metasploit Console

Comments
1 min read
How to Activate and Enable the PostgreSQL Service on Your Kali Linux System

How to Activate and Enable the PostgreSQL Service on Your Kali Linux System

Comments
1 min read
Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

1
Comments
4 min read
Pushed Authorization Requests in .NET 9: Why and How to Use Them

Pushed Authorization Requests in .NET 9: Why and How to Use Them

7
Comments
8 min read
Confidence in the cloud with data sovereignty

Confidence in the cloud with data sovereignty

Comments
3 min read
Issue 79 of AWS Cloud Security Weekly

Issue 79 of AWS Cloud Security Weekly

1
Comments
1 min read
Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

2
Comments
1 min read
Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

1
Comments
3 min read
Secrets Management in Kubernetes: Best Practices for Security

Secrets Management in Kubernetes: Best Practices for Security

13
Comments
6 min read
Securely access Amazon EKS with GitHub Actions and OpenID Connect

Securely access Amazon EKS with GitHub Actions and OpenID Connect

5
Comments
3 min read
Top 7 Kubernetes Certifications in 2025

Top 7 Kubernetes Certifications in 2025

1
Comments
2 min read
loading...