Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How I scanned dev.to APIs for vulnerabilities

How I scanned dev.to APIs for vulnerabilities

32
Comments 3
1 min read
CloudFront Standing In the Front

CloudFront Standing In the Front

15
Comments
4 min read
Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection
Cover image for Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

9
Comments
8 min read
Kubernetes least privilege implementation using the Google Cloud as an example
Cover image for Kubernetes least privilege implementation using the Google Cloud as an example

Kubernetes least privilege implementation using the Google Cloud as an example

9
Comments
7 min read
Lets talk a bit about ISO/IEC 27001
Cover image for Lets talk a bit about ISO/IEC 27001

Lets talk a bit about ISO/IEC 27001

10
Comments 1
5 min read
Controlling access to the API with Lambda authorizers

Controlling access to the API with Lambda authorizers

12
Comments
6 min read
From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths
Cover image for From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

5
Comments
4 min read
Role of a SecOps Center, SecOps team, & SecOps with AI

Role of a SecOps Center, SecOps team, & SecOps with AI

7
Comments
3 min read
AWS is only as safe as the weakest credentials setup for your developers.
Cover image for AWS is only as safe as the weakest credentials setup for your developers.

AWS is only as safe as the weakest credentials setup for your developers.

13
Comments
10 min read
No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]
Cover image for No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

9
Comments 1
7 min read
What is SecOps and Its Benefits

What is SecOps and Its Benefits

5
Comments
3 min read
Enarx: The future of Trusted Execution Environment Frameworks
Cover image for Enarx: The future of Trusted Execution Environment Frameworks

Enarx: The future of Trusted Execution Environment Frameworks

11
Comments
3 min read
https

https

6
Comments
4 min read
Little step to use PKI easiest
Cover image for Little step to use PKI easiest

Little step to use PKI easiest

10
Comments
7 min read
Getting Started with Matrix
Cover image for Getting Started with Matrix

Getting Started with Matrix

6
Comments
4 min read
JWT, access token, and refresh token
Cover image for JWT, access token, and refresh token

JWT, access token, and refresh token

7
Comments
3 min read
WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

7
Comments 1
1 min read
Protecting APIs with custom headers in CloudFront

Protecting APIs with custom headers in CloudFront

19
Comments 2
6 min read
OverTheWire Natas Levels 0-11 Thinking Out Loud

OverTheWire Natas Levels 0-11 Thinking Out Loud

7
Comments
10 min read
Best Practices for Securing Your Vulnerable REST APIs

Best Practices for Securing Your Vulnerable REST APIs

9
Comments
1 min read
How do you Integrate Emissary Ingress with OPA
Cover image for How do you Integrate Emissary Ingress with OPA

How do you Integrate Emissary Ingress with OPA

6
Comments
7 min read
Handling Sensitive Data: A Primer

Handling Sensitive Data: A Primer

20
Comments
6 min read
Keyoxide Proof

Keyoxide Proof

4
Comments
1 min read
How to detect your leaking API endpoints using EthicalCheck

How to detect your leaking API endpoints using EthicalCheck

4
Comments
1 min read
CherryBomb: So what's new??
Cover image for CherryBomb: So what's new??

CherryBomb: So what's new??

15
Comments
2 min read
loading...