Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why your API should explicitly take resource owner id as a parameter instead of inferring from authentication.

Why your API should explicitly take resource owner id as a parameter instead of inferring from authentication.

8
Comments
3 min read
GitHub Personal Access Tokens (PAT)
Cover image for GitHub Personal Access Tokens (PAT)

GitHub Personal Access Tokens (PAT)

3
Comments 1
3 min read
Web Crawling VS Web Scraping: What Is the Difference?

Web Crawling VS Web Scraping: What Is the Difference?

7
Comments 3
4 min read
What is DevSecOps? Shift security left in your DevOps lifecycle
Cover image for What is DevSecOps? Shift security left in your DevOps lifecycle

What is DevSecOps? Shift security left in your DevOps lifecycle

3
Comments
4 min read
What is Identity : Auth0

What is Identity : Auth0

4
Comments
1 min read
Linux Security Modules
Cover image for Linux Security Modules

Linux Security Modules

3
Comments
6 min read
Is web scraping legal?
Cover image for Is web scraping legal?

Is web scraping legal?

7
Comments 3
17 min read
Penetration Testing Stages and Methodologies
Cover image for Penetration Testing Stages and Methodologies

Penetration Testing Stages and Methodologies

2
Comments 1
2 min read
Replace a JPA entity with a DTO
Cover image for Replace a JPA entity with a DTO

Replace a JPA entity with a DTO

11
Comments 2
4 min read
Spending spring days crafting packets at NahamCon 2022
Cover image for Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
LGPD e falsear dados sensíveis no banco de dados de dev e staging - parte 1

LGPD e falsear dados sensíveis no banco de dados de dev e staging - parte 1

4
Comments
5 min read
OWASP TOP 10 - SSRF
Cover image for OWASP TOP 10 - SSRF

OWASP TOP 10 - SSRF

10
Comments
2 min read
Securing our internal tools

Securing our internal tools

10
Comments
2 min read
What is Penetration Testing ?
Cover image for What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
AWS Security Stories #02: AWS Trusted Advisor

AWS Security Stories #02: AWS Trusted Advisor

Comments
1 min read
Enforcing encryption standards on S3-objects
Cover image for Enforcing encryption standards on S3-objects

Enforcing encryption standards on S3-objects

10
Comments
6 min read
Security in Laravel: How to Protect Your App Part 4

Security in Laravel: How to Protect Your App Part 4

12
Comments 1
1 min read
Carbon - Python Renamer
Cover image for Carbon - Python Renamer

Carbon - Python Renamer

5
Comments 1
1 min read
Types of Steganography methods that are used for hiding confidential data.

Types of Steganography methods that are used for hiding confidential data.

8
Comments
4 min read
Prevent External Contracts

Prevent External Contracts

6
Comments
2 min read
AWS Security Stories #01: Virtual Patching

AWS Security Stories #01: Virtual Patching

3
Comments
3 min read
Scaled Virus Scanner using AWS Fargate, ClamAV, S3, and SQS with Terraform

Scaled Virus Scanner using AWS Fargate, ClamAV, S3, and SQS with Terraform

12
Comments 7
8 min read
Security in Laravel: How to Protect Your App Part 3

Security in Laravel: How to Protect Your App Part 3

10
Comments 1
2 min read
Stop putting AWS credentials in the credentials file
Cover image for Stop putting AWS credentials in the credentials file

Stop putting AWS credentials in the credentials file

19
Comments
6 min read
Update Firefox products now to fix critical vulnerabilities

Update Firefox products now to fix critical vulnerabilities

6
Comments
1 min read
loading...