Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your APIs: A Guide to Design Patterns for Robust Defense
Cover image for Securing Your APIs: A Guide to Design Patterns for Robust Defense

Securing Your APIs: A Guide to Design Patterns for Robust Defense

Comments
3 min read
SSH Config for Multiple SSH Authentication
Cover image for SSH Config for Multiple SSH Authentication

SSH Config for Multiple SSH Authentication

15
Comments
1 min read
Security news weekly round-up - 5th July 2024
Cover image for Security news weekly round-up - 5th July 2024

Security news weekly round-up - 5th July 2024

Comments
3 min read
Implementing Secure Authentication in Next.js with JWT and MongoDB. Protect Routes using middleware

Implementing Secure Authentication in Next.js with JWT and MongoDB. Protect Routes using middleware

1
Comments
3 min read
Securing Generative AI Applications: A Comprehensive Approach
Cover image for Securing Generative AI Applications: A Comprehensive Approach

Securing Generative AI Applications: A Comprehensive Approach

Comments
4 min read
Data Consistency and Integrity in API Integration
Cover image for Data Consistency and Integrity in API Integration

Data Consistency and Integrity in API Integration

2
Comments
5 min read
Secure Access to Connected Devices
Cover image for Secure Access to Connected Devices

Secure Access to Connected Devices

Comments
2 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

5
Comments
2 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA
Cover image for Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
Protecting Sensitive Data using Ansible Vault
Cover image for Protecting Sensitive Data using Ansible Vault

Protecting Sensitive Data using Ansible Vault

2
Comments
4 min read
𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚

𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚

5
Comments 7
1 min read
Safe and Secure Consumption of Open Source Libraries
Cover image for Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
What Technologies Help Prevent Cyber Attacks? 🛡️💻

What Technologies Help Prevent Cyber Attacks? 🛡️💻

2
Comments
1 min read
𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

1
Comments
1 min read
How to Apply a Magento 2 Patch
Cover image for How to Apply a Magento 2 Patch

How to Apply a Magento 2 Patch

5
Comments 2
2 min read
JWT for Developers: Behind the Scenes.
Cover image for JWT for Developers: Behind the Scenes.

JWT for Developers: Behind the Scenes.

4
Comments 1
4 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown
Cover image for SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Patch your servers! It's time of regreSSHion
Cover image for Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
How to Design Secure and Safe APIs: 12 Essential Tips for API Security
Cover image for How to Design Secure and Safe APIs: 12 Essential Tips for API Security

How to Design Secure and Safe APIs: 12 Essential Tips for API Security

2
Comments
3 min read
Level up your Git security: Verified commits with Kleopatra!
Cover image for Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

6
Comments
1 min read
🛡️ Key cybersecurity threats in 2024: What should businesses know?

🛡️ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
Como um Malware opera, quais são os seus tipos e como se proteger.
Cover image for Como um Malware opera, quais são os seus tipos e como se proteger.

Como um Malware opera, quais são os seus tipos e como se proteger.

3
Comments
5 min read
Gone in 120 seconds

Gone in 120 seconds

1
Comments
5 min read
How to Implement Two-Factor Authentication (2FA) in Golang
Cover image for How to Implement Two-Factor Authentication (2FA) in Golang

How to Implement Two-Factor Authentication (2FA) in Golang

17
Comments
16 min read
Quarterly Rewards for security researchers!
Cover image for Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
loading...