Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Understanding the OWASP® Top 10 Security Threats

Cybersecurity Understanding the OWASP® Top 10 Security Threats

1
Comments
1 min read
How can you secure microservices architecture using AWS services?

How can you secure microservices architecture using AWS services?

1
Comments
2 min read
Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

Rust-Powered Password Decrypter: Find the String Behind the Hash! 🦀🔒

1
Comments
2 min read
Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Comments
6 min read
Getting Started with AWS Security Credentials and CLI 🧑‍💻

Getting Started with AWS Security Credentials and CLI 🧑‍💻

Comments
2 min read
What are the main challenges in SaaS product development

What are the main challenges in SaaS product development

Comments
2 min read
I am a wall - Call me a VPC

I am a wall - Call me a VPC

2
Comments 2
3 min read
Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Comments
5 min read
Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

Hands-on Guide to Sealed Secrets: Deploying .NET 6 Apps Securely in KIND

1
Comments
3 min read
API Authentication: Part I. Basic Authentication

API Authentication: Part I. Basic Authentication

Comments
11 min read
The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

Comments
3 min read
Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.

Why Struggle with Software Challenges? Let Tanzu Handle the Heavy Lifting.

1
Comments
3 min read
Can We Truly Trust VPNs and Anonymity Tools?

Can We Truly Trust VPNs and Anonymity Tools?

6
Comments 1
2 min read
How Java Development Services Ensure Robust Security for Enterprise-Level Applications

How Java Development Services Ensure Robust Security for Enterprise-Level Applications

Comments
7 min read
Will AI be banned? A game theory analysis.

Will AI be banned? A game theory analysis.

3
Comments
20 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

59
Comments 2
4 min read
Validação e Sanitização em Aplicações Web

Validação e Sanitização em Aplicações Web

Comments
2 min read
Fundamentos da Segurança em Aplicações Web

Fundamentos da Segurança em Aplicações Web

Comments
2 min read
Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

Must Known Top Hacker Tools for 2025 | Kali Linux | Cybersecurity

16
Comments
1 min read
The Rising Tide of Platform Engineering: Reshaping Security in Modern DevOps

The Rising Tide of Platform Engineering: Reshaping Security in Modern DevOps

11
Comments 1
3 min read
Understanding AWS IAM: My Learning Journey as a Cloud Engineer 🚀

Understanding AWS IAM: My Learning Journey as a Cloud Engineer 🚀

Comments
3 min read
Security Management and Advanced Threat Protection

Security Management and Advanced Threat Protection

Comments
2 min read
✋🏼🗺 🔥 CS Visualized: CORS

✋🏼🗺 🔥 CS Visualized: CORS

16
Comments
11 min read
Securing Laravel Reverb

Securing Laravel Reverb

4
Comments
4 min read
loading...