Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
Observability and Security with AWS
Cover image for Observability and Security with AWS

Observability and Security with AWS

Comments
4 min read
Memory Safe or Bust?
Cover image for Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
US government warns against C and C++ code
Cover image for US government warns against C and C++ code

US government warns against C and C++ code

5
Comments
4 min read
GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I
Cover image for GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

Comments
5 min read
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
Cover image for A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

2
Comments 1
10 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview
Cover image for Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
Loop DOS? Letś Discuss.
Cover image for Loop DOS? Letś Discuss.

Loop DOS? Letś Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data
Cover image for Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Issue 40 of AWS Cloud Security Weekly
Cover image for Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
Mastering JWT Security
Cover image for Mastering JWT Security

Mastering JWT Security

93
Comments 18
3 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

10
Comments
11 min read
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments
Cover image for Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
Using nmap for Continuous Vulnerability Monitoring
Cover image for Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Taming misconfiguration chaos with Resourcely
Cover image for Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
Securing TiddlyWiki with Pomerium
Cover image for Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
6 security advancements that Plang offers for the user

6 security advancements that Plang offers for the user

Comments
2 min read
Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)
Cover image for Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Comments
5 min read
Securing the Cloud #26
Cover image for Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Better Threat Detection with CloudWatch Logs and Generative AI
Cover image for Better Threat Detection with CloudWatch Logs and Generative AI

Better Threat Detection with CloudWatch Logs and Generative AI

1
Comments
6 min read
Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images

7
Comments
7 min read
Security news weekly round-up - 12th April 2024
Cover image for Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
Protect API Gateway with Amazon Verified Permissions
Cover image for Protect API Gateway with Amazon Verified Permissions

Protect API Gateway with Amazon Verified Permissions

3
Comments 2
8 min read
Data Privacy in API Integrations
Cover image for Data Privacy in API Integrations

Data Privacy in API Integrations

3
Comments
5 min read
Beyond the login screen
Cover image for Beyond the login screen

Beyond the login screen

1
Comments
5 min read
loading...