Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Basic security best-practices for your web app & server

Basic security best-practices for your web app & server

3
Comments
3 min read
Ultimate guide to HTTP Strict Transport Security (HSTS)
Cover image for Ultimate guide to HTTP Strict Transport Security (HSTS)

Ultimate guide to HTTP Strict Transport Security (HSTS)

17
Comments
10 min read
Using Environment Protection Rules to Secure Secrets When Building External Forks with pull_request_target 🤐
Cover image for Using Environment Protection Rules to Secure Secrets When Building External Forks with pull_request_target 🤐

Using Environment Protection Rules to Secure Secrets When Building External Forks with pull_request_target 🤐

12
Comments 2
4 min read
Managing Secrets During Docker Build

Managing Secrets During Docker Build

11
Comments
9 min read
Stripe for online payments
Cover image for Stripe for online payments

Stripe for online payments

11
Comments
2 min read
Encrypt your notes with GnuPG

Encrypt your notes with GnuPG

5
Comments
2 min read
Authentication & Authorization in Microservices Architecture - Part I
Cover image for Authentication & Authorization in Microservices Architecture - Part I

Authentication & Authorization in Microservices Architecture - Part I

402
Comments 28
6 min read
Tryhackme Blue
Cover image for Tryhackme Blue

Tryhackme Blue

3
Comments
1 min read
Exposing sequential IDs is bad! Here is how to avoid it.
Cover image for Exposing sequential IDs is bad! Here is how to avoid it.

Exposing sequential IDs is bad! Here is how to avoid it.

8
Comments 6
4 min read
Security news weekly round-up - 5th March 2021
Cover image for Security news weekly round-up - 5th March 2021

Security news weekly round-up - 5th March 2021

1
Comments 1
3 min read
Securely Access QLDB from a Private Subnet
Cover image for Securely Access QLDB from a Private Subnet

Securely Access QLDB from a Private Subnet

9
Comments 3
3 min read
SSH - Configurations
Cover image for SSH - Configurations

SSH - Configurations

4
Comments 2
3 min read
Why PASETO is better than JWT for token-based authentication?

Why PASETO is better than JWT for token-based authentication?

173
Comments 8
11 min read
Easily Create Allow (or Deny) Lists for Azure Resources

Easily Create Allow (or Deny) Lists for Azure Resources

Comments
3 min read
Account Factory - provision AWS Accounts

Account Factory - provision AWS Accounts

11
Comments
3 min read
Why you should host public npm packages in a private registry
Cover image for Why you should host public npm packages in a private registry

Why you should host public npm packages in a private registry

15
Comments
4 min read
Announcing the tru.ID CLI
Cover image for Announcing the tru.ID CLI

Announcing the tru.ID CLI

5
Comments
7 min read
How react-native-config make my life easier to steal secret keys of your React Native Application
Cover image for How react-native-config make my life easier to steal secret keys of your React Native Application

How react-native-config make my life easier to steal secret keys of your React Native Application

5
Comments
1 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich
Cover image for Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

6
Comments
2 min read
Secure Azure deployments with Bicep and Azure Key Vault

Secure Azure deployments with Bicep and Azure Key Vault

20
Comments
6 min read
Security in Software Development - Part 1
Cover image for Security in Software Development - Part 1

Security in Software Development - Part 1

2
Comments
2 min read
How much for my personnal data on the Dark Web ?
Cover image for How much for my personnal data on the Dark Web ?

How much for my personnal data on the Dark Web ?

1
Comments
1 min read
Content Security Policy Header: A Complete Guide
Cover image for Content Security Policy Header: A Complete Guide

Content Security Policy Header: A Complete Guide

12
Comments
15 min read
JS-X-Ray 3.0

JS-X-Ray 3.0

8
Comments 1
2 min read
Password management on the command line

Password management on the command line

15
Comments 2
5 min read
loading...