Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
2 Authentication Methods in Web Development: Session-Based vs. Token-Based!
Cover image for 2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

1
Comments
6 min read
Easy on Humans, Hard on Bots
Cover image for Easy on Humans, Hard on Bots

Easy on Humans, Hard on Bots

2
Comments
4 min read
Kubernetes CIS Benchmarking Tool : Day 17 of 50 days DevOps Tools Series

Kubernetes CIS Benchmarking Tool : Day 17 of 50 days DevOps Tools Series

Comments
3 min read
Security Best Practices
Cover image for Security Best Practices

Security Best Practices

1
Comments
2 min read
Authentication & Authorization: The Backbone of Secure Systems 🛡
Cover image for Authentication & Authorization: The Backbone of Secure Systems 🛡

Authentication & Authorization: The Backbone of Secure Systems 🛡

Comments
3 min read
Api Rest .Net completa com JwtToken, integração com api ViaCep utilizando padrão de arquitetura clean architecture

Api Rest .Net completa com JwtToken, integração com api ViaCep utilizando padrão de arquitetura clean architecture

2
Comments
9 min read
Security news weekly round-up - 26th July 2024
Cover image for Security news weekly round-up - 26th July 2024

Security news weekly round-up - 26th July 2024

Comments
3 min read
Understanding network virtualization and how it helps in day-to-day infrastructure.
Cover image for Understanding network virtualization and how it helps in day-to-day infrastructure.

Understanding network virtualization and how it helps in day-to-day infrastructure.

Comments
5 min read
AI in Cybersecurity: Improving Data Security Services
Cover image for AI in Cybersecurity: Improving Data Security Services

AI in Cybersecurity: Improving Data Security Services

1
Comments
4 min read
Automating Kubernetes Security with Kyverno : Day 16 of 50 days DevOps Tools Series

Automating Kubernetes Security with Kyverno : Day 16 of 50 days DevOps Tools Series

2
Comments
3 min read
Why Use Rust?

Why Use Rust?

5
Comments 2
3 min read
Securing your secrets in AWS
Cover image for Securing your secrets in AWS

Securing your secrets in AWS

34
Comments 2
34 min read
POST only? Let's end this absurd API design debate

POST only? Let's end this absurd API design debate

60
Comments 8
5 min read
Using TruffleHog and pre-commit hook to prevent secret exposure

Using TruffleHog and pre-commit hook to prevent secret exposure

5
Comments
3 min read
Complete Guide To Redeeming TECNO SRC Credits
Cover image for Complete Guide To Redeeming TECNO SRC Credits

Complete Guide To Redeeming TECNO SRC Credits

Comments
1 min read
Form Login with Spring Boot and Thymeleaf

Form Login with Spring Boot and Thymeleaf

2
Comments
7 min read
Securing the AWS Infrastructure

Securing the AWS Infrastructure

2
Comments
4 min read
Lanjutan Lapisan OSI
Cover image for Lanjutan Lapisan OSI

Lanjutan Lapisan OSI

1
Comments
3 min read
How to Hire an Android Developer for Your Project in 2024
Cover image for How to Hire an Android Developer for Your Project in 2024

How to Hire an Android Developer for Your Project in 2024

Comments 1
5 min read
Linux commands to analyze DDoS attacks
Cover image for Linux commands to analyze DDoS attacks

Linux commands to analyze DDoS attacks

1
Comments
3 min read
A Guide to JWTs: Signing with RS256 Made Simple.
Cover image for A Guide to JWTs: Signing with RS256 Made Simple.

A Guide to JWTs: Signing with RS256 Made Simple.

6
Comments 1
3 min read
Day 18: Centralized ELK Stack Setup
Cover image for Day 18: Centralized ELK Stack Setup

Day 18: Centralized ELK Stack Setup

2
Comments 1
2 min read
A hands-on lab: Why running as root in Kubernetes containers is dangerous?

A hands-on lab: Why running as root in Kubernetes containers is dangerous?

1
Comments 2
5 min read
Comandos Linux para analisar ataques DDoS
Cover image for Comandos Linux para analisar ataques DDoS

Comandos Linux para analisar ataques DDoS

Comments
3 min read
Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

6
Comments
3 min read
loading...