Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments 1
2 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Input/Output Validation: Best Practices for API Communication
Cover image for Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

1
Comments
10 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit
Cover image for Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
The Hack That Made People Rich.....in Subway Surfers
Cover image for The Hack That Made People Rich.....in Subway Surfers

The Hack That Made People Rich.....in Subway Surfers

2
Comments 2
4 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS
Cover image for Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

1
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots
Cover image for SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

1
Comments
10 min read
How to Prevent SQL Injection
Cover image for How to Prevent SQL Injection

How to Prevent SQL Injection

1
Comments
2 min read
AI Security: The Next Frontier in Infrastructure Protection

AI Security: The Next Frontier in Infrastructure Protection

Comments
4 min read
How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.