Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Secure Google Drive Picker: Token Best Practices
Cover image for Secure Google Drive Picker: Token Best Practices

Secure Google Drive Picker: Token Best Practices

2
Comments 1
2 min read
How RBAC and ABAC Enhance Security and Compliance

How RBAC and ABAC Enhance Security and Compliance

Comments
5 min read
LTL and CTL Applications for Smart Contracts Security

LTL and CTL Applications for Smart Contracts Security

Comments
3 min read
Hack the Planet as a Service
Cover image for Hack the Planet as a Service

Hack the Planet as a Service

Comments
3 min read
AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2
Cover image for AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

Comments
4 min read
Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3
Cover image for Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Comments
17 min read
Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

6
Comments
7 min read
Hash Passwords in Backend: A Guide for Every Tech Stack
Cover image for Hash Passwords in Backend: A Guide for Every Tech Stack

Hash Passwords in Backend: A Guide for Every Tech Stack

1
Comments
3 min read
DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

Comments
6 min read
Beware of the New Enemy Problem ⚠️

Beware of the New Enemy Problem ⚠️

1
Comments
4 min read
Building a Secure User Activation System in Django
Cover image for Building a Secure User Activation System in Django

Building a Secure User Activation System in Django

3
Comments 1
4 min read
S3cmd: CLI for Object Storage

S3cmd: CLI for Object Storage

6
Comments
3 min read
Bow to the rectangle
Cover image for Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Computer Viruses in Practice: Self-Replication
Cover image for Computer Viruses in Practice: Self-Replication

Computer Viruses in Practice: Self-Replication

Comments
6 min read
Isolating AI Agents with DevContainer: A secure and scalable approach

Isolating AI Agents with DevContainer: A secure and scalable approach

9
Comments 1
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.