Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Death of DevSecOps, Part 2
Cover image for Death of DevSecOps, Part 2

Death of DevSecOps, Part 2

3
Comments
4 min read
Enhancing Security in Web Applications with Custom Response Headers in Next.js

Enhancing Security in Web Applications with Custom Response Headers in Next.js

3
Comments 1
2 min read
Pipeline Integrity and Security in DevSecOps
Cover image for Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Interoperability for Seamless Integration of Blockchain Networks
Cover image for Interoperability for Seamless Integration of Blockchain Networks

Interoperability for Seamless Integration of Blockchain Networks

1
Comments
4 min read
Amazon Inspector
Cover image for Amazon Inspector

Amazon Inspector

5
Comments
3 min read
Code Integrity Unleashed: The Crucial Role of Git Signed Commits

Code Integrity Unleashed: The Crucial Role of Git Signed Commits

1
Comments
1 min read
Java URI Library Compliant with RFC 3986
Cover image for Java URI Library Compliant with RFC 3986

Java URI Library Compliant with RFC 3986

4
Comments
9 min read
OpenID Connect Flows: From Implicit to Authorization Code with PKCE & BFF
Cover image for OpenID Connect Flows: From Implicit to Authorization Code with PKCE & BFF

OpenID Connect Flows: From Implicit to Authorization Code with PKCE & BFF

1
Comments
30 min read
Social engineering
Cover image for Social engineering

Social engineering

26
Comments
10 min read
OpenSSF Case Study: Enhancing Open Source Security with Sigstore at Stacklok

OpenSSF Case Study: Enhancing Open Source Security with Sigstore at Stacklok

3
Comments
1 min read
Access Google Cloud Secret Manager via Google Apps Script
Cover image for Access Google Cloud Secret Manager via Google Apps Script

Access Google Cloud Secret Manager via Google Apps Script

Comments
2 min read
Nearly Offline Revocation Status Checks for JWT

Nearly Offline Revocation Status Checks for JWT

2
Comments
2 min read
Implementing AWS Config for your Organization with CloudFormation
Cover image for Implementing AWS Config for your Organization with CloudFormation

Implementing AWS Config for your Organization with CloudFormation

5
Comments 2
13 min read
Building a Bulletproof CI/CD Pipeline: A Comprehensive Guide
Cover image for Building a Bulletproof CI/CD Pipeline: A Comprehensive Guide

Building a Bulletproof CI/CD Pipeline: A Comprehensive Guide

355
Comments 18
14 min read
User Authorization with Postgres Row Level Security Policy

User Authorization with Postgres Row Level Security Policy

2
Comments 1
2 min read
JS Security Tip 05-01-2024 ICYMI

JS Security Tip 05-01-2024 ICYMI

Comments
1 min read
📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌
Cover image for 📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

1
Comments
4 min read
Step by Step Troubleshooting WAFv2 - With Pictures
Cover image for Step by Step Troubleshooting WAFv2 - With Pictures

Step by Step Troubleshooting WAFv2 - With Pictures

6
Comments
4 min read
The Future of Bug Logging and Internet Security
Cover image for The Future of Bug Logging and Internet Security

The Future of Bug Logging and Internet Security

7
Comments
3 min read
Azure PostgreSQL, Entra ID Authentication and .NET

Azure PostgreSQL, Entra ID Authentication and .NET

12
Comments
8 min read
BSides312 2024: Insights and Innovations in Cybersecurity
Cover image for BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
Flutter: Best Practices for API Key Security ✅
Cover image for Flutter: Best Practices for API Key Security ✅

Flutter: Best Practices for API Key Security ✅

30
Comments
5 min read
AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

2
Comments
15 min read
重置 Linux root 密碼

重置 Linux root 密碼

Comments
1 min read
JavaScript Security: Simple Practices to Secure Your Frontend
Cover image for JavaScript Security: Simple Practices to Secure Your Frontend

JavaScript Security: Simple Practices to Secure Your Frontend

301
Comments 20
3 min read
loading...