Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
5 Tricks to Secure your Docker Images
Cover image for 5 Tricks to Secure your Docker Images

5 Tricks to Secure your Docker Images

19
Comments
3 min read
CORS Done Wrong? Say Hello to Security Risks!

CORS Done Wrong? Say Hello to Security Risks!

3
Comments 4
3 min read
Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros
Cover image for Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros

Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros

Comments
7 min read
Mobile Application Security: From Theory to Practice in Financial Systems
Cover image for Mobile Application Security: From Theory to Practice in Financial Systems

Mobile Application Security: From Theory to Practice in Financial Systems

1
Comments
6 min read
Understanding Antimalware Service Executable: Is It Safe to Disable?
Cover image for Understanding Antimalware Service Executable: Is It Safe to Disable?

Understanding Antimalware Service Executable: Is It Safe to Disable?

2
Comments 1
3 min read
Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System
Cover image for Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Comments
9 min read
Secure Your RESTful API Using Keycloak Role-Based Access Control
Cover image for Secure Your RESTful API Using Keycloak Role-Based Access Control

Secure Your RESTful API Using Keycloak Role-Based Access Control

13
Comments 2
8 min read
How to Create Secure and Scalable Web Applications with MERN
Cover image for How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
What is Port 22? SSH, Security Risks, & Best Practices
Cover image for What is Port 22? SSH, Security Risks, & Best Practices

What is Port 22? SSH, Security Risks, & Best Practices

Comments
5 min read
Introducing Zerodayf, A dynamic, AI-driven code analysis vulnerability scanner

Introducing Zerodayf, A dynamic, AI-driven code analysis vulnerability scanner

Comments
1 min read
Wireless Networks and Mobile Communication 📡📲
Cover image for Wireless Networks and Mobile Communication 📡📲

Wireless Networks and Mobile Communication 📡📲

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career
Cover image for Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
Manual Cognito user registration approvals with Step Functions

Manual Cognito user registration approvals with Step Functions

9
Comments
10 min read
ACID in Databases: A Comprehensive Guide
Cover image for ACID in Databases: A Comprehensive Guide

ACID in Databases: A Comprehensive Guide

Comments
5 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.