Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Keep Consumer Data Secure on Your E-Commerce Website
Cover image for How to Keep Consumer Data Secure on Your E-Commerce Website

How to Keep Consumer Data Secure on Your E-Commerce Website

1
Comments
5 min read
Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

1
Comments
11 min read
Server Certificate Chain

Server Certificate Chain

Comments
3 min read
Hacking Access to Power Automate
Cover image for Hacking Access to Power Automate

Hacking Access to Power Automate

83
Comments 2
8 min read
The Case for Standards in Mobile App Security
Cover image for The Case for Standards in Mobile App Security

The Case for Standards in Mobile App Security

4
Comments 1
4 min read
Production-Ready Vault Deployment on EC2: A Detailed Guide
Cover image for Production-Ready Vault Deployment on EC2: A Detailed Guide

Production-Ready Vault Deployment on EC2: A Detailed Guide

2
Comments
11 min read
Download a Website Certificate
Cover image for Download a Website Certificate

Download a Website Certificate

1
Comments
2 min read
Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

2
Comments
3 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack
Cover image for An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

1
Comments
4 min read
AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1
Cover image for AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

1
Comments
8 min read
Using Amazon Cognito with the user-password flow
Cover image for Using Amazon Cognito with the user-password flow

Using Amazon Cognito with the user-password flow

4
Comments
8 min read
Using 1Password with External Secrets Operator in a GitOps way
Cover image for Using 1Password with External Secrets Operator in a GitOps way

Using 1Password with External Secrets Operator in a GitOps way

19
Comments
7 min read
Issue 55 of AWS Cloud Security Weekly
Cover image for Issue 55 of AWS Cloud Security Weekly

Issue 55 of AWS Cloud Security Weekly

3
Comments
1 min read
Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates
Cover image for Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

2
Comments
4 min read
Resourcely founder-led in person or virtual hands-on workshop
Cover image for Resourcely founder-led in person or virtual hands-on workshop

Resourcely founder-led in person or virtual hands-on workshop

Comments
1 min read
What's the Difference Between Session-Based Authentication and JWTs?
Cover image for What's the Difference Between Session-Based Authentication and JWTs?

What's the Difference Between Session-Based Authentication and JWTs?

2
Comments
3 min read
How to decode a JWT
Cover image for How to decode a JWT

How to decode a JWT

2
Comments
1 min read
How to Deploy Infisical to Manage Application Secrets on Koyeb
Cover image for How to Deploy Infisical to Manage Application Secrets on Koyeb

How to Deploy Infisical to Manage Application Secrets on Koyeb

Comments
11 min read
Need Help with Nodemailer Access Issues on Outlook and Gmail

Need Help with Nodemailer Access Issues on Outlook and Gmail

Comments
1 min read
CrowdStrike Software Update Leads to Significant Global Tech Outage

CrowdStrike Software Update Leads to Significant Global Tech Outage

Comments
3 min read
Serverless Security - Cognito Misconfigurations
Cover image for Serverless Security - Cognito Misconfigurations

Serverless Security - Cognito Misconfigurations

8
Comments 1
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans

The Data Security Duo: Data Encryption and Vulnerability Scans

1
Comments
5 min read
Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager
Cover image for Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager

Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager

3
Comments 2
3 min read
2 Authentication Methods in Web Development: Session-Based vs. Token-Based!
Cover image for 2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

1
Comments
6 min read
loading...