Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Replit GenAI Security Scans and Shadow AI

Replit GenAI Security Scans and Shadow AI

1
Comments
5 min read
AI Hallucinations: Can We Trust AI-Generated Data?

AI Hallucinations: Can We Trust AI-Generated Data?

5
Comments 1
1 min read
Data Security & Authorization: The Dual Pillars of a Robust Database System

Data Security & Authorization: The Dual Pillars of a Robust Database System

Comments
2 min read
How Certificate-Based Authentication Works: Explained with CAS++ and Smart Cards

How Certificate-Based Authentication Works: Explained with CAS++ and Smart Cards

Comments
1 min read
Microsoft Defender for Business Explained: Antivirus, EDR, and Ransomware Protection for SMEs

Microsoft Defender for Business Explained: Antivirus, EDR, and Ransomware Protection for SMEs

Comments
3 min read
Secure Your Devices for a Decade with Windows 11 IoT Enterprise LTSC 2024

Secure Your Devices for a Decade with Windows 11 IoT Enterprise LTSC 2024

Comments
2 min read
Office 365 E5 for Enterprises: The All-in-One Platform for Secure Communication, Analytics, and Compliance

Office 365 E5 for Enterprises: The All-in-One Platform for Secure Communication, Analytics, and Compliance

Comments
3 min read
🔍 TLS Debugging, Demystified: See Inside Encrypted Traffic in Seconds

🔍 TLS Debugging, Demystified: See Inside Encrypted Traffic in Seconds

Comments
1 min read
🔐 Still storing JWT in LocalStorage? Time to stop — here’s the 2025 way

🔐 Still storing JWT in LocalStorage? Time to stop — here’s the 2025 way

Comments
1 min read
🔐 DevSecOps 2025: One Loop to Catch Them All

🔐 DevSecOps 2025: One Loop to Catch Them All

Comments
1 min read
🛑 Still in the disk group? You’re one command from root.

🛑 Still in the disk group? You’re one command from root.

Comments
1 min read
Exploring customLogger: Smart, Customizable Logging in Payload CMS

Exploring customLogger: Smart, Customizable Logging in Payload CMS

1
Comments
10 min read
Supply Chain Attacks: The Silent Killer with THM Nagpur

Supply Chain Attacks: The Silent Killer with THM Nagpur

5
Comments
4 min read
Troubleshooting ERR_SSL_PROTOCOL_ERROR in Chrome & Android Devices

Troubleshooting ERR_SSL_PROTOCOL_ERROR in Chrome & Android Devices

Comments
4 min read
May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

May 2025 in Auth0: Async Auth, Real-Time Streams, and Custom Everything

Comments
4 min read
API Security Best Practices to Protect Digital Ecosystems

API Security Best Practices to Protect Digital Ecosystems

2
Comments
8 min read
Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games

Always Winning at Juwenalia: Hacking Rewards from the Festival App's Mini-Games

Comments
6 min read
Cybersecurity for Beginners: How to Get Started in 2025

Cybersecurity for Beginners: How to Get Started in 2025

1
Comments
3 min read
Timing Attacks: Why Your Code Might Be Leaking Secrets

Timing Attacks: Why Your Code Might Be Leaking Secrets

2
Comments 1
6 min read
Cloud Security Technologies: CSPM, CASB, CIEM, CWPP and CNAPP in the AWS Ecosystem

Cloud Security Technologies: CSPM, CASB, CIEM, CWPP and CNAPP in the AWS Ecosystem

Comments
3 min read
Secure SSH by Using a Restricted User: Smarter Linux Hardening

Secure SSH by Using a Restricted User: Smarter Linux Hardening

Comments
1 min read
How to Add Passkey Authentication to Your App with AuthAction Passkey Plus

How to Add Passkey Authentication to Your App with AuthAction Passkey Plus

Comments
2 min read
Store Encrypted Data in Your Database Using .NET – Secure and Efficient

Store Encrypted Data in Your Database Using .NET – Secure and Efficient

Comments
4 min read
🛡️ Stop Face Spoofing! EasyShield AI: 92% Accuracy optimized for Edge Devices

🛡️ Stop Face Spoofing! EasyShield AI: 92% Accuracy optimized for Edge Devices

Comments
1 min read
BIOS Password Bypass

BIOS Password Bypass

Comments
1 min read
loading...