Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM
Cover image for RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

3
Comments 1
6 min read
Zero Trust API Security: Never Trust, Always Protect
Cover image for Zero Trust API Security: Never Trust, Always Protect

Zero Trust API Security: Never Trust, Always Protect

Comments
10 min read
Protecting Your APIs from Insider Threats: The Access Control Playbook
Cover image for Protecting Your APIs from Insider Threats: The Access Control Playbook

Protecting Your APIs from Insider Threats: The Access Control Playbook

Comments
10 min read
Vibe Coding with AI? Don't Forget These Security Fundamentals

Vibe Coding with AI? Don't Forget These Security Fundamentals

1
Comments
2 min read
🔐 I Built a JavaScript Web Vulnerability Scanner Devs Can Actually Use (CLI, Web UI, and AI-Powered Fixes)

🔐 I Built a JavaScript Web Vulnerability Scanner Devs Can Actually Use (CLI, Web UI, and AI-Powered Fixes)

1
Comments 1
2 min read
Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

19
Comments
3 min read
If You Can't Control Access, You Can't Control the Cloud (Part 1)
Cover image for If You Can't Control Access, You Can't Control the Cloud (Part 1)

If You Can't Control Access, You Can't Control the Cloud (Part 1)

3
Comments 1
6 min read
Understanding Kubernetes RBAC
Cover image for Understanding Kubernetes RBAC

Understanding Kubernetes RBAC

Comments
3 min read
Your First Steps to a Hardened SSH Server
Cover image for Your First Steps to a Hardened SSH Server

Your First Steps to a Hardened SSH Server

Comments
6 min read
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Comments
3 min read
Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication
Cover image for Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

1
Comments
13 min read
Mastering XSS Prevention: Tips for Developers
Cover image for Mastering XSS Prevention: Tips for Developers

Mastering XSS Prevention: Tips for Developers

Comments
12 min read
How to Secure AWS Lambda Webhooks With Signature Verification
Cover image for How to Secure AWS Lambda Webhooks With Signature Verification

How to Secure AWS Lambda Webhooks With Signature Verification

Comments
2 min read
User Management in Red Hat Linux: Proven Strategies and Practical Use Cases
Cover image for User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

6
Comments
5 min read
Understanding XSRF Protection: Implementation in Fetch vs. Axios

Understanding XSRF Protection: Implementation in Fetch vs. Axios

5
Comments 2
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.