Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Use JWT Authentication in Spring Boot (Java 21) — An End-to-End Beginner Guide

How to Use JWT Authentication in Spring Boot (Java 21) — An End-to-End Beginner Guide

10
Comments
10 min read
I Was Tired of Spam, So I Built My Own Temporary Email System
Cover image for I Was Tired of Spam, So I Built My Own Temporary Email System

I Was Tired of Spam, So I Built My Own Temporary Email System

6
Comments 2
7 min read
🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide
Cover image for 🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide

🚀 Secrets Safe, 3-Tier Deployments Fast: Terraform + Azure Key Vault Complete Hands-On Guide

Comments
4 min read
Day 6 — Image Hardening (The Audit)
Cover image for Day 6 — Image Hardening (The Audit)

Day 6 — Image Hardening (The Audit)

3
Comments
3 min read
Modernizing Legacy Workloads: KubeVirt on AKS with Azure Arc Identity

Modernizing Legacy Workloads: KubeVirt on AKS with Azure Arc Identity

Comments
9 min read
Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀
Cover image for Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀

Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀

11
Comments 3
3 min read
IA dans DevSecOps

IA dans DevSecOps

Comments
3 min read
From Alerts to Answers: AWS Security Hub & Amazon Detective
Cover image for From Alerts to Answers: AWS Security Hub & Amazon Detective

From Alerts to Answers: AWS Security Hub & Amazon Detective

1
Comments
2 min read
Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Quantum Certifications: Are We Being Fooled? by Arvind Sundararajan

Comments
2 min read
Linux firewall- iptables

Linux firewall- iptables

Comments
2 min read
Why We Don't Use Browser Extensions: The Clickjacking Problem

Why We Don't Use Browser Extensions: The Clickjacking Problem

Comments
5 min read
Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (GuĂ­a de Supervivencia)
Cover image for Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (GuĂ­a de Supervivencia)

Post-Mortem: Cuando los Backups Automatizados fallan y el SII te respira en la nuca (GuĂ­a de Supervivencia)

1
Comments
5 min read
AI Agents and context-aware permissions

AI Agents and context-aware permissions

Comments
8 min read
Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Quantum's Achilles Heel: How Subtle Attacks Can Blindside Security Systems by Arvind Sundararajan

Comments
2 min read
How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

How to Secure LangChain Agents with Cryptographic Signatures (Tutorial)

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.