Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Use .env Securely in DevOps Projects

How to Use .env Securely in DevOps Projects

6
Comments
2 min read
🔒 Bandit: Python Static Application Security Testing Guide

🔒 Bandit: Python Static Application Security Testing Guide

1
Comments 1
3 min read
🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library
Cover image for 🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

Comments
2 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)
Cover image for Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

14
Comments 3
3 min read
Best DAM Software for Organizing Media on NAS (2025 Guide)

Best DAM Software for Organizing Media on NAS (2025 Guide)

Comments
4 min read
Secrets Management & Zero-Trust Architecture for Web3-Grade Security
Cover image for Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Comments
1 min read
Why can deleted files be recovered?

Why can deleted files be recovered?

Comments
5 min read
Penetration Testing for API Security: Protecting Digital Gateways
Cover image for Penetration Testing for API Security: Protecting Digital Gateways

Penetration Testing for API Security: Protecting Digital Gateways

3
Comments
12 min read
How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

Comments
2 min read
Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

15
Comments
2 min read
2-Factor Authentication OTP: TOTP & HOTP Algorithms
Cover image for 2-Factor Authentication OTP: TOTP & HOTP Algorithms

2-Factor Authentication OTP: TOTP & HOTP Algorithms

1
Comments
6 min read
MCP Is Rewriting the Rules of API Integration
Cover image for MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

6
Comments
8 min read
Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths
Cover image for Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Comments
1 min read
The Security Crisis: How Tanzu Spring Is Changing the Game
Cover image for The Security Crisis: How Tanzu Spring Is Changing the Game

The Security Crisis: How Tanzu Spring Is Changing the Game

3
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.