Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Opa Gatekeeper: How To Write Policies For Kubernetes Clusters
Cover image for Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

13
Comments 1
10 min read
Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB
Cover image for Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

9
Comments 1
6 min read
Top 10 Application Security Vulnerabilities in 2024
Cover image for Top 10 Application Security Vulnerabilities in 2024

Top 10 Application Security Vulnerabilities in 2024

22
Comments
6 min read
Tokenization vs encryption
Cover image for Tokenization vs encryption

Tokenization vs encryption

1
Comments
4 min read
How to disable Spring Security for static resources
Cover image for How to disable Spring Security for static resources

How to disable Spring Security for static resources

Comments
2 min read
Securing Data at Rest: The Importance of Encryption and How to Implement It
Cover image for Securing Data at Rest: The Importance of Encryption and How to Implement It

Securing Data at Rest: The Importance of Encryption and How to Implement It

Comments
3 min read
Code Smell 258 - Secrets in Code
Cover image for Code Smell 258 - Secrets in Code

Code Smell 258 - Secrets in Code

4
Comments
2 min read
Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

6
Comments
4 min read
The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens
Cover image for The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

1
Comments
6 min read
Security in LLMs: Safeguarding AI Systems - V
Cover image for Security in LLMs: Safeguarding AI Systems - V

Security in LLMs: Safeguarding AI Systems - V

Comments
7 min read
Webhooks vs. polling

Webhooks vs. polling

77
Comments 7
3 min read
Gitleaks: Find forgotten codes in your repositories
Cover image for Gitleaks: Find forgotten codes in your repositories

Gitleaks: Find forgotten codes in your repositories

Comments
1 min read
Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Comments
5 min read
SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP
Cover image for SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

Comments
2 min read
Usando PAM no Linux

Usando PAM no Linux

5
Comments
4 min read
Security news weekly round-up - 12th July 2024
Cover image for Security news weekly round-up - 12th July 2024

Security news weekly round-up - 12th July 2024

Comments
4 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024
Cover image for Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
Comments
6 min read
Mitigating XSS Risks: Best Practices for Web Applications
Cover image for Mitigating XSS Risks: Best Practices for Web Applications

Mitigating XSS Risks: Best Practices for Web Applications

7
Comments
4 min read
Enhancing PostgreSQL Security with the Credcheck Extension
Cover image for Enhancing PostgreSQL Security with the Credcheck Extension

Enhancing PostgreSQL Security with the Credcheck Extension

3
Comments
1 min read
How AI and Machine Learning Are Revolutionizing IT Services
Cover image for How AI and Machine Learning Are Revolutionizing IT Services

How AI and Machine Learning Are Revolutionizing IT Services

Comments
2 min read
DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT
Cover image for DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

11
Comments 1
1 min read
Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

2
Comments
2 min read
Foremost ที่ไม่ใช่ นม

Foremost ที่ไม่ใช่ นม

1
Comments
1 min read
Creating users in Amazon Cognito programmatically
Cover image for Creating users in Amazon Cognito programmatically

Creating users in Amazon Cognito programmatically

Comments
3 min read
VaultWarden: Your local password manager

VaultWarden: Your local password manager

3
Comments
5 min read
loading...