Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity in the Age of Digital Transformation
Cover image for Cybersecurity in the Age of Digital Transformation

Cybersecurity in the Age of Digital Transformation

5
Comments
2 min read
Webhook Security Approaches
Cover image for Webhook Security Approaches

Webhook Security Approaches

11
Comments
3 min read
Drupal Access Policy demystified
Cover image for Drupal Access Policy demystified

Drupal Access Policy demystified

4
Comments 3
12 min read
Amazon GuardDuty Malware Protection for Amazon S3

Amazon GuardDuty Malware Protection for Amazon S3

2
Comments
2 min read
Managing and Rotating Secrets with AWS Secrets Manager
Cover image for Managing and Rotating Secrets with AWS Secrets Manager

Managing and Rotating Secrets with AWS Secrets Manager

18
Comments
4 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

4
Comments
10 min read
The Body Shop of Security: Biometrics
Cover image for The Body Shop of Security: Biometrics

The Body Shop of Security: Biometrics

27
Comments
2 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing
Cover image for Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

52
Comments
9 min read
Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté
Cover image for Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Comments
2 min read
Enable Touch ID Authentication for sudo on macOS Sonoma 14.x
Cover image for Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

44
Comments
2 min read
Mastering Version Control with Git: Beyond the Basics
Cover image for Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

295
Comments 1
10 min read
Nations attacking their own internet (to stop cheating on exams)

Nations attacking their own internet (to stop cheating on exams)

17
Comments
1 min read
Best Python Libraries for Cybersecurity in 2024
Cover image for Best Python Libraries for Cybersecurity in 2024

Best Python Libraries for Cybersecurity in 2024

14
Comments 8
13 min read
A primer on open-source intelligence for bug bounty hunting in Grafana
Cover image for A primer on open-source intelligence for bug bounty hunting in Grafana

A primer on open-source intelligence for bug bounty hunting in Grafana

5
Comments
10 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

Comments
2 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

Comments 2
2 min read
Security news weekly round-up - 21st June 2024
Cover image for Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

Comments
2 min read
Securing your machine identities means better secrets management
Cover image for Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

1
Comments
8 min read
OAuth 2.1 is Here: What You Need to Know

OAuth 2.1 is Here: What You Need to Know

17
Comments
6 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

21
Comments 1
2 min read
【Ethical Hacker】Nice to meet you~
Cover image for 【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

8
Comments
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email
Cover image for Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
loading...