Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Creating Cross-Account DynamoDB Backups with Terraform

Creating Cross-Account DynamoDB Backups with Terraform

1
Comments
4 min read
DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE
Cover image for DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

1
Comments
1 min read
Issue 52 of AWS Cloud Security Weekly
Cover image for Issue 52 of AWS Cloud Security Weekly

Issue 52 of AWS Cloud Security Weekly

4
Comments
1 min read
BSides Boulder 2024: Improving Security For All In The High Desert
Cover image for BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login
Cover image for Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

3
Comments
7 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

1
Comments
2 min read
Build vs. Buy: How to approach SSO for your SaaS app
Cover image for Build vs. Buy: How to approach SSO for your SaaS app

Build vs. Buy: How to approach SSO for your SaaS app

2
Comments
4 min read
Identity and Access Management: Why it is an Absolute Necessity Today
Cover image for Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Understanding self-assumption and scoped-down policy in AWS IAM

Understanding self-assumption and scoped-down policy in AWS IAM

7
Comments 1
3 min read
Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security
Cover image for Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Comments
2 min read
AWS: Kubernetes and Access Management API, the new authentication in EKS

AWS: Kubernetes and Access Management API, the new authentication in EKS

1
Comments 1
11 min read
Upstream preview: The value of open source software
Cover image for Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Recreating Stripe’s Roles in PropelAuth
Cover image for Recreating Stripe’s Roles in PropelAuth

Recreating Stripe’s Roles in PropelAuth

Comments
5 min read
How to Protect Your Application from AI Bots
Cover image for How to Protect Your Application from AI Bots

How to Protect Your Application from AI Bots

4
Comments
10 min read
Internet security through lava lamps

Internet security through lava lamps

Comments
3 min read
AI and Data Privacy: Balancing Innovation and Security in the Digital Age
Cover image for AI and Data Privacy: Balancing Innovation and Security in the Digital Age

AI and Data Privacy: Balancing Innovation and Security in the Digital Age

1
Comments
11 min read
WebCheck: Find out what hackers know about your site
Cover image for WebCheck: Find out what hackers know about your site

WebCheck: Find out what hackers know about your site

1
Comments
1 min read
AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

Comments
12 min read
OAuth em aplicações SPA / Mobile (PKCE extension)

OAuth em aplicações SPA / Mobile (PKCE extension)

1
Comments
4 min read
API Security Fundamentals: Key Practices for Developers
Cover image for API Security Fundamentals: Key Practices for Developers

API Security Fundamentals: Key Practices for Developers

3
Comments 1
13 min read
Execute JavaScript in a WebAssembly QuickJS Sandbox
Cover image for Execute JavaScript in a WebAssembly QuickJS Sandbox

Execute JavaScript in a WebAssembly QuickJS Sandbox

7
Comments
4 min read
AWS Cognito - IAM in the Cloud
Cover image for AWS Cognito - IAM in the Cloud

AWS Cognito - IAM in the Cloud

Comments
3 min read
Scenario based practices for securing an AWS S3 bucket.

Scenario based practices for securing an AWS S3 bucket.

7
Comments
2 min read
Beyond JWT: Unlocking PASETO for Secure Token Management

Beyond JWT: Unlocking PASETO for Secure Token Management

3
Comments
7 min read
JavaScript app security audit

JavaScript app security audit

2
Comments
2 min read
loading...