Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Common Issues and Resolutions When Setting Up a VPC in AWS

Common Issues and Resolutions When Setting Up a VPC in AWS

Comments
3 min read
High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

5
Comments
5 min read
Issue 57 & 58 of AWS Cloud Security Weekly
Cover image for Issue 57 & 58 of AWS Cloud Security Weekly

Issue 57 & 58 of AWS Cloud Security Weekly

2
Comments 1
2 min read
Simple and Easy-to-Use Web Security Gateway

Simple and Easy-to-Use Web Security Gateway

5
Comments
2 min read
Building an Authentication System with MERN
Cover image for Building an Authentication System with MERN

Building an Authentication System with MERN

1
Comments
4 min read
Achieving Sustainable Development Goals through Green Building Standards
Cover image for Achieving Sustainable Development Goals through Green Building Standards

Achieving Sustainable Development Goals through Green Building Standards

3
Comments
4 min read
Code Smell 262 - Not Replaced Constants
Cover image for Code Smell 262 - Not Replaced Constants

Code Smell 262 - Not Replaced Constants

1
Comments
2 min read
How we use Kubernetes jobs to scale OpenSSF Scorecard
Cover image for How we use Kubernetes jobs to scale OpenSSF Scorecard

How we use Kubernetes jobs to scale OpenSSF Scorecard

12
Comments
7 min read
Understanding Linux Permissions

Understanding Linux Permissions

17
Comments
2 min read
Securing the Cloud #32
Cover image for Securing the Cloud #32

Securing the Cloud #32

Comments
5 min read
Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security
Cover image for Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security

Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security

Comments
2 min read
Death of DevSecOps, Part 3
Cover image for Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis
Cover image for OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Cryptography #0 - Essential Concepts
Cover image for Cryptography #0 - Essential Concepts

Cryptography #0 - Essential Concepts

5
Comments
7 min read
Introducing OpenSSF Scorecard for OpenSauced
Cover image for Introducing OpenSSF Scorecard for OpenSauced

Introducing OpenSSF Scorecard for OpenSauced

15
Comments 1
5 min read
Secure Data and Safeguard Users an App With End-to-End Encryption

Secure Data and Safeguard Users an App With End-to-End Encryption

Comments
9 min read
An autopsy on the CrowdStrike outage
Cover image for An autopsy on the CrowdStrike outage

An autopsy on the CrowdStrike outage

2
Comments 2
6 min read
What Is a Distributed Denial-of-Service attack
Cover image for What Is a Distributed Denial-of-Service attack

What Is a Distributed Denial-of-Service attack

Comments
1 min read
Is magic link sign-in dying? A closer look at its declining popularity

Is magic link sign-in dying? A closer look at its declining popularity

22
Comments 2
3 min read
Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution
Cover image for Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

2
Comments 1
9 min read
Day 8: Mastering Bash Scripting in DevOps
Cover image for Day 8: Mastering Bash Scripting in DevOps

Day 8: Mastering Bash Scripting in DevOps

5
Comments
2 min read
What is Secrets Scanning? How to Protect Your Application Data
Cover image for What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
Protect Sensitive Pages With Nginx
Cover image for Protect Sensitive Pages With Nginx

Protect Sensitive Pages With Nginx

3
Comments
2 min read
How to easily fix OpenSSH RegreSSHion vulnerability
Cover image for How to easily fix OpenSSH RegreSSHion vulnerability

How to easily fix OpenSSH RegreSSHion vulnerability

Comments
2 min read
Why Python Is Good For Cybersecurity

Why Python Is Good For Cybersecurity

11
Comments 2
4 min read
loading...