Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
I rolled my own auth

I rolled my own auth

4
Comments 2
1 min read
Windows Device Management: Streamline Your IT Operations
Cover image for Windows Device Management: Streamline Your IT Operations

Windows Device Management: Streamline Your IT Operations

Comments
5 min read
SSH Authentication Key Rotation: Why and How to Expire SSH Keys
Cover image for SSH Authentication Key Rotation: Why and How to Expire SSH Keys

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

8
Comments
4 min read
The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)
Cover image for The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

11
Comments 2
3 min read
Outtake: Revolutionizing Threat Detection with GPT-4.1
Cover image for Outtake: Revolutionizing Threat Detection with GPT-4.1

Outtake: Revolutionizing Threat Detection with GPT-4.1

Comments 1
3 min read
CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025
Cover image for CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

1
Comments
1 min read
Authenticate GitHub Actions to Azure using OpenID Connect

Authenticate GitHub Actions to Azure using OpenID Connect

1
Comments
4 min read
Startup Life: From DevOps to Filling Out Compliance Spreadsheets

Startup Life: From DevOps to Filling Out Compliance Spreadsheets

1
Comments
3 min read
Secure Your Spring Boot API with JWT and Role-Based Authorization

Secure Your Spring Boot API with JWT and Role-Based Authorization

1
Comments
5 min read
Terraforming the Cloud
Cover image for Terraforming the Cloud

Terraforming the Cloud

16
Comments 13
2 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization
Cover image for 🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
Creating a Kinde workflow to check for malicious IPs during authentication
Cover image for Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.