Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)
Cover image for What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)

What is a CDN? The Secret Sauce Behind Fast Internet (Explained in 5 Minutes)

2
Comments
5 min read
Security Showdown: GitHub Actions vs. GitLab CI vs. Jenkins – Who Keeps Your Secrets Safe?

Security Showdown: GitHub Actions vs. GitLab CI vs. Jenkins – Who Keeps Your Secrets Safe?

Comments
3 min read
Secure Admin Setup Without a Database (for Now!)
Cover image for Secure Admin Setup Without a Database (for Now!)

Secure Admin Setup Without a Database (for Now!)

Comments
3 min read
curl, it's got u

curl, it's got u

1
Comments
2 min read
MCP Security: Tr-tr-tr-tricky, tricky, tricky

MCP Security: Tr-tr-tr-tricky, tricky, tricky

12
Comments 1
4 min read
Cursor AI Security - Deep Dive into Risk, Policy, and Practice
Cover image for Cursor AI Security - Deep Dive into Risk, Policy, and Practice

Cursor AI Security - Deep Dive into Risk, Policy, and Practice

5
Comments 2
4 min read
Your Plaintext Email is a DevSecOps Blind Spot
Cover image for Your Plaintext Email is a DevSecOps Blind Spot

Your Plaintext Email is a DevSecOps Blind Spot

Comments
5 min read
Drosera HandBook: The ABC of Traps
Cover image for Drosera HandBook: The ABC of Traps

Drosera HandBook: The ABC of Traps

5
Comments
13 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks
Cover image for (Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
The Inevitable Decay: How Long Before an Unpatched Kubernetes Cluster Becomes Critically Vulnerable?
Cover image for The Inevitable Decay: How Long Before an Unpatched Kubernetes Cluster Becomes Critically Vulnerable?

The Inevitable Decay: How Long Before an Unpatched Kubernetes Cluster Becomes Critically Vulnerable?

6
Comments
3 min read
Fuzz Testing & Invariants in Solidity: Secure Smart Contracts with Foundry
Cover image for Fuzz Testing & Invariants in Solidity: Secure Smart Contracts with Foundry

Fuzz Testing & Invariants in Solidity: Secure Smart Contracts with Foundry

1
Comments 2
10 min read
JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers
Cover image for JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers

JWT vs OAuth2 vs Session Cookies: A Complete Authentication Strategy Breakdown for Full Stack Developers

3
Comments 2
5 min read
Rethinking Data Security: Built-in Protection from the Frontend
Cover image for Rethinking Data Security: Built-in Protection from the Frontend

Rethinking Data Security: Built-in Protection from the Frontend

1
Comments 2
5 min read
Como bloqueei um bot abusivo (Scrapy) via User-Agent no NGINX
Cover image for Como bloqueei um bot abusivo (Scrapy) via User-Agent no NGINX

Como bloqueei um bot abusivo (Scrapy) via User-Agent no NGINX

3
Comments 2
2 min read
CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional
Cover image for CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.