Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Implement Two-Factor Authentication (2FA) in Golang
Cover image for How to Implement Two-Factor Authentication (2FA) in Golang

How to Implement Two-Factor Authentication (2FA) in Golang

17
Comments
16 min read
Quarterly Rewards for security researchers!
Cover image for Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives
Cover image for Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

3
Comments 1
1 min read
Intro to Application Security
Cover image for Intro to Application Security

Intro to Application Security

24
Comments 6
3 min read
AWS All Builders Welcome Grant & re:Inforce Newbie
Cover image for AWS All Builders Welcome Grant & re:Inforce Newbie

AWS All Builders Welcome Grant & re:Inforce Newbie

6
Comments 2
4 min read
Cybersecurity 101 for Developers: From Zero to Hero
Cover image for Cybersecurity 101 for Developers: From Zero to Hero

Cybersecurity 101 for Developers: From Zero to Hero

4
Comments
4 min read
Security in Requirements phase
Cover image for Security in Requirements phase

Security in Requirements phase

5
Comments 2
8 min read
I'm Under DDoS Attack

I'm Under DDoS Attack

8
Comments
6 min read
When has rolling your own auth gone wrong?

When has rolling your own auth gone wrong?

Comments 1
2 min read
Understanding Security Context in Kubernetes

Understanding Security Context in Kubernetes

8
Comments 1
2 min read
[Python] Tool Hacking Plus

[Python] Tool Hacking Plus

Comments
1 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security
Cover image for Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

1
Comments 1
7 min read
Creating your own security attribute with Symfony

Creating your own security attribute with Symfony

3
Comments
2 min read
OWASP Dependency Check in Node js 🛡️
Cover image for OWASP Dependency Check in Node js 🛡️

OWASP Dependency Check in Node js 🛡️

8
Comments
1 min read
Memo to pass AWS Certified Security Specialty(SCS-C02)

Memo to pass AWS Certified Security Specialty(SCS-C02)

3
Comments 1
1 min read
Security news weekly round-up - 28th June 2024
Cover image for Security news weekly round-up - 28th June 2024

Security news weekly round-up - 28th June 2024

2
Comments
3 min read
Understanding and Preventing XSS Attacks in C# Applications
Cover image for Understanding and Preventing XSS Attacks in C# Applications

Understanding and Preventing XSS Attacks in C# Applications

7
Comments
2 min read
Protecting User Data: Encryption and Secure Storage in Frontend

Protecting User Data: Encryption and Secure Storage in Frontend

7
Comments
7 min read
Securing the Cloud #30
Cover image for Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
Leveraging Environment Variables in Next.js for Secure Data Access

Leveraging Environment Variables in Next.js for Secure Data Access

2
Comments
2 min read
Why single sign-on (SSO) is better

Why single sign-on (SSO) is better

25
Comments 1
5 min read
The End of X (Or, It Should Be): How Elon Killed Twitter
Cover image for The End of X (Or, It Should Be): How Elon Killed Twitter

The End of X (Or, It Should Be): How Elon Killed Twitter

45
Comments 31
10 min read
Using ModSecurity in Nginx project — maintaining protection on WordPress
Cover image for Using ModSecurity in Nginx project — maintaining protection on WordPress

Using ModSecurity in Nginx project — maintaining protection on WordPress

8
Comments
8 min read
Cybersecurity in the Age of Digital Transformation
Cover image for Cybersecurity in the Age of Digital Transformation

Cybersecurity in the Age of Digital Transformation

5
Comments
2 min read
loading...