Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Scalable AWS 3-Tier Architecture: My Journey

Building a Scalable AWS 3-Tier Architecture: My Journey

Comments
2 min read
Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro

Stop Exposing Secrets! Secure Your APIs in Postman Like a Pro

1
Comments
6 min read
How to Secure AWS Infrastructure

How to Secure AWS Infrastructure

Comments
5 min read
OTS: Your One-Time Secret Sharing Solution - Secure, Simple, and Self-Destructing!

OTS: Your One-Time Secret Sharing Solution - Secure, Simple, and Self-Destructing!

Comments
2 min read
Your Guide to Cyber Hygiene: Simple Steps to Protect Yourself Online

Your Guide to Cyber Hygiene: Simple Steps to Protect Yourself Online

Comments
4 min read
How can GIS map in video management software platform to enhance video management?

How can GIS map in video management software platform to enhance video management?

Comments
1 min read
Understanding Linux and Its Directory Structure

Understanding Linux and Its Directory Structure

7
Comments
4 min read
Getting Started with AWS IAM: Understanding Users

Getting Started with AWS IAM: Understanding Users

3
Comments
2 min read
Top 7 Dockerfile Security Tips You Should Know

Top 7 Dockerfile Security Tips You Should Know

1
Comments
3 min read
Securing the Model Context Protocol

Securing the Model Context Protocol

13
Comments
8 min read
ToolHive: Making MCP Servers Easy, Secure, and Fun

ToolHive: Making MCP Servers Easy, Secure, and Fun

19
Comments
6 min read
Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

1
Comments
7 min read
𝗗𝗲𝘀𝗶𝗴𝗻𝗶𝗻𝗴 𝗘𝘅𝗽𝗲𝗻𝘀𝗲 𝗮𝗻𝗱 𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 𝗳𝗼𝗿 𝗥𝗼𝗹𝗲-𝗕𝗮𝘀𝗲𝗱 𝗔𝗰𝗰𝗲𝘀𝘀 𝗖𝗼𝗻𝘁𝗿𝗼𝗹 🚀

𝗗𝗲𝘀𝗶𝗴𝗻𝗶𝗻𝗴 𝗘𝘅𝗽𝗲𝗻𝘀𝗲 𝗮𝗻𝗱 𝗖𝗮𝘁𝗲𝗴𝗼𝗿𝘆 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 𝗳𝗼𝗿 𝗥𝗼𝗹𝗲-𝗕𝗮𝘀𝗲𝗱 𝗔𝗰𝗰𝗲𝘀𝘀 𝗖𝗼𝗻𝘁𝗿𝗼𝗹 🚀

Comments
1 min read
Understanding Secure Communication: Encryption, Hashing, and Certificates

Understanding Secure Communication: Encryption, Hashing, and Certificates

50
Comments
3 min read
Uploading Files Securely to AWS S3 Using Presigned URLs

Uploading Files Securely to AWS S3 Using Presigned URLs

2
Comments
2 min read
Beware of the New Enemy Problem ⚠️

Beware of the New Enemy Problem ⚠️

1
Comments
4 min read
Securing Configuration Settings in .NET Applications

Securing Configuration Settings in .NET Applications

Comments
2 min read
What's the Best Windows Reseller Plan in 2025?

What's the Best Windows Reseller Plan in 2025?

Comments
3 min read
How to Remove a Malicious App on Your Android Phone

How to Remove a Malicious App on Your Android Phone

Comments 1
2 min read
Passkeys: Should You Build or Buy? A Practical Guide

Passkeys: Should You Build or Buy? A Practical Guide

1
Comments
3 min read
Stop giving hackers the easy button

Stop giving hackers the easy button

1
Comments
4 min read
🔐 OAuth 2.0 + OpenID Connect (OIDC) 🪪

🔐 OAuth 2.0 + OpenID Connect (OIDC) 🪪

1
Comments
9 min read
Building Trustworthy AI: Importance of Guardrails in AWS Bedrock and Q Business

Building Trustworthy AI: Importance of Guardrails in AWS Bedrock and Q Business

6
Comments 1
5 min read
Simplifying VPC, Subnets, NAT Gateway, Internet Gateway & Route Tables

Simplifying VPC, Subnets, NAT Gateway, Internet Gateway & Route Tables

2
Comments
5 min read
All About CORS Headers

All About CORS Headers

Comments
3 min read
loading...