Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices
Cover image for Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comments
4 min read
How to Hide the X-Powered-By Header in NestJS

How to Hide the X-Powered-By Header in NestJS

8
Comments 2
1 min read
Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform
Cover image for Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

3
Comments
3 min read
De4py: Advanced python reverse engineering
Cover image for De4py: Advanced python reverse engineering

De4py: Advanced python reverse engineering

10
Comments
2 min read
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Security news weekly round-up - 17 May 2024
Cover image for Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
Removendo Dados Sensiveis de Images
Cover image for Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

3
Comments
6 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide
Cover image for Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Securing the Cloud #29
Cover image for Securing the Cloud #29

Securing the Cloud #29

5
Comments
3 min read
Secure Your Django App with Parameterized Queries
Cover image for Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

5
Comments
3 min read
The Benefits of Opting Out from Using OfficialUSA.com
Cover image for The Benefits of Opting Out from Using OfficialUSA.com

The Benefits of Opting Out from Using OfficialUSA.com

1
Comments 1
4 min read
How NSX Data Center Enhances Network Security for Businesses
Cover image for How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Is Open Source More Secure? Understanding the Nuances
Cover image for Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
Implement PKCS#7 padding
Cover image for Implement PKCS#7 padding

Implement PKCS#7 padding

2
Comments
3 min read
Test Automation in API Security Testing
Cover image for Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
AWS Credentials for Serverless
Cover image for AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Implementing symmetric and asymmetric encryption with NodeJS
Cover image for Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

23
Comments 1
9 min read
Are Your Secrets Projects Truly Safe?🔐
Cover image for Are Your Secrets Projects Truly Safe?🔐

Are Your Secrets Projects Truly Safe?🔐

Comments 2
2 min read
The Containerization Brick for your Platform Engineering Toolbox
Cover image for The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform
Cover image for Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

1
Comments
7 min read
Client assertion in OAuth 2.0 client authentication

Client assertion in OAuth 2.0 client authentication

12
Comments
4 min read
loading...