Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Serverless Security: Building Trust in the Cloud
Cover image for Serverless Security: Building Trust in the Cloud

Serverless Security: Building Trust in the Cloud

Comments
5 min read
Penetration Testing Firms: 10 Red Flags Every Business Should Know
Cover image for Penetration Testing Firms: 10 Red Flags Every Business Should Know

Penetration Testing Firms: 10 Red Flags Every Business Should Know

1
Comments
22 min read
Zeroize: The Tiny and Memory-Safe Rust Crate
Cover image for Zeroize: The Tiny and Memory-Safe Rust Crate

Zeroize: The Tiny and Memory-Safe Rust Crate

1
Comments
2 min read
Snowflake Architecture Series: A Foundational Checklist

Snowflake Architecture Series: A Foundational Checklist

Comments
11 min read
Using AWS Detective Controls for Real-Time Security with Logs & Monitoring
Cover image for Using AWS Detective Controls for Real-Time Security with Logs & Monitoring

Using AWS Detective Controls for Real-Time Security with Logs & Monitoring

2
Comments
3 min read
Your application should be PCI-DSS-compliant
Cover image for Your application should be PCI-DSS-compliant

Your application should be PCI-DSS-compliant

5
Comments
5 min read
Segurança com Zabbix

Segurança com Zabbix

Comments
2 min read
Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn
Cover image for Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

3
Comments
4 min read
The Ruby OAuth Collective
Cover image for The Ruby OAuth Collective

The Ruby OAuth Collective

6
Comments 2
1 min read
Reference Architecture for Team AI Productivity
Cover image for Reference Architecture for Team AI Productivity

Reference Architecture for Team AI Productivity

5
Comments
9 min read
La cybersécurité et les mots de passe

La cybersécurité et les mots de passe

Comments
1 min read
How to Use NFC for Contactless Door Access (with Code Examples)

How to Use NFC for Contactless Door Access (with Code Examples)

Comments
4 min read
100DaysOfCode — Day 28

100DaysOfCode — Day 28

Comments
1 min read
Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)
Cover image for Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

5
Comments
4 min read
How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront
Cover image for How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

3
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.