Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Authentication Explained: Basic, Bearer, OAuth2, JWT, and SSO
Cover image for Authentication Explained: Basic, Bearer, OAuth2, JWT, and SSO

Authentication Explained: Basic, Bearer, OAuth2, JWT, and SSO

Comments
3 min read
Mastering Enterprise GitOps: Advanced Strategies for Cloud-Native Deployments

Mastering Enterprise GitOps: Advanced Strategies for Cloud-Native Deployments

Comments
5 min read
Secure Note Manager in React - Part 2. Client-Side Login with Web Crypto and Redux

Secure Note Manager in React - Part 2. Client-Side Login with Web Crypto and Redux

Comments
5 min read
Enhance your Code Security with Amazon Inspector
Cover image for Enhance your Code Security with Amazon Inspector

Enhance your Code Security with Amazon Inspector

7
Comments 2
4 min read
đź”’ Top 7 Security Practices Every Backend Developer Must Know
Cover image for đź”’ Top 7 Security Practices Every Backend Developer Must Know

đź”’ Top 7 Security Practices Every Backend Developer Must Know

Comments
2 min read
Your API is cute, but is it secure?
Cover image for Your API is cute, but is it secure?

Your API is cute, but is it secure?

21
Comments 2
4 min read
Optional FDE in ubuntu using initrd hooks

Optional FDE in ubuntu using initrd hooks

1
Comments
4 min read
Browser Security in 2025: Architecture & Dev Trade-offs

Browser Security in 2025: Architecture & Dev Trade-offs

Comments
4 min read
Just-in-Time (JIT) SSH Access with a Bastion Host on Proxmox VE
Cover image for Just-in-Time (JIT) SSH Access with a Bastion Host on Proxmox VE

Just-in-Time (JIT) SSH Access with a Bastion Host on Proxmox VE

1
Comments
4 min read
Networking Series 2: VPC Traffic Flow and Security

Networking Series 2: VPC Traffic Flow and Security

Comments
3 min read
The OAuth Integration Nightmare: 8 Critical Components you'll need to build

The OAuth Integration Nightmare: 8 Critical Components you'll need to build

4
Comments 1
15 min read
The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025
Cover image for The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

Comments
7 min read
Stop shipping insecure file permissions
Cover image for Stop shipping insecure file permissions

Stop shipping insecure file permissions

Comments
1 min read
From DevOps to Internal Developer Platforms (IDPs): Why Enterprises Are Building Golden Paths
Cover image for From DevOps to Internal Developer Platforms (IDPs): Why Enterprises Are Building Golden Paths

From DevOps to Internal Developer Platforms (IDPs): Why Enterprises Are Building Golden Paths

Comments
4 min read
Detecting Android Malware Using Only App Permissions: A Lightweight ML Approach
Cover image for Detecting Android Malware Using Only App Permissions: A Lightweight ML Approach

Detecting Android Malware Using Only App Permissions: A Lightweight ML Approach

Comments
14 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.