Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The 10 Commandments .NET Developers Must apply for Secure Applications
Cover image for The 10 Commandments .NET Developers Must apply for Secure Applications

The 10 Commandments .NET Developers Must apply for Secure Applications

112
Comments 11
11 min read
Benefits Of Cloud Testing And Best Practices
Cover image for Benefits Of Cloud Testing And Best Practices

Benefits Of Cloud Testing And Best Practices

5
Comments
13 min read
About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes
Cover image for About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

14
Comments
9 min read
Beginner's Guide to website security testing

Beginner's Guide to website security testing

12
Comments
5 min read
Web <=2.0 Apps/Sites are Never Safe to Use

Web <=2.0 Apps/Sites are Never Safe to Use

5
Comments 1
4 min read
Blockchain Easily Explained
Cover image for Blockchain Easily Explained

Blockchain Easily Explained

5
Comments 1
2 min read
WebRTC Security in Plain Language for Business People
Cover image for WebRTC Security in Plain Language for Business People

WebRTC Security in Plain Language for Business People

5
Comments
24 min read
Insecure Deserialization For Beginners
Cover image for Insecure Deserialization For Beginners

Insecure Deserialization For Beginners

16
Comments
3 min read
C - Unsafe!
Cover image for C - Unsafe!

C - Unsafe!

9
Comments 4
4 min read
.NET 7 WebApp with Https in Docker, secured by Azure AD

.NET 7 WebApp with Https in Docker, secured by Azure AD

10
Comments 3
4 min read
AWS IAM Access Analyzer Demystified
Cover image for AWS IAM Access Analyzer Demystified

AWS IAM Access Analyzer Demystified

7
Comments
4 min read
Secure AWS deploys from Github Actions with OIDC
Cover image for Secure AWS deploys from Github Actions with OIDC

Secure AWS deploys from Github Actions with OIDC

13
Comments
14 min read
Design your own security vulnerability #1

Design your own security vulnerability #1

4
Comments
2 min read
How Does Face ID or Touch ID Work? Intro to WebAuthn
Cover image for How Does Face ID or Touch ID Work? Intro to WebAuthn

How Does Face ID or Touch ID Work? Intro to WebAuthn

4
Comments
6 min read
Acra. Features: Integrate data protection that fits your architecture
Cover image for Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

10
Comments 1
2 min read
npm-registry-firewall

npm-registry-firewall

2
Comments
4 min read
Does Java 18 finally have a better alternative to JNI?
Cover image for Does Java 18 finally have a better alternative to JNI?

Does Java 18 finally have a better alternative to JNI?

52
Comments 4
9 min read
Encrypting Attached EBS Volumes
Cover image for Encrypting Attached EBS Volumes

Encrypting Attached EBS Volumes

10
Comments
3 min read
One of these two apple.com domains is fake
Cover image for One of these two apple.com domains is fake

One of these two apple.com domains is fake

7
Comments 1
2 min read
How to Not Expose the Personal Data of 19,577 Canadians
Cover image for How to Not Expose the Personal Data of 19,577 Canadians

How to Not Expose the Personal Data of 19,577 Canadians

9
Comments
4 min read
Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms
Cover image for Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

4
Comments
4 min read
Cloud Security for Newly Disctributed Enginerring Teams
Cover image for Cloud Security for Newly Disctributed Enginerring Teams

Cloud Security for Newly Disctributed Enginerring Teams

3
Comments
4 min read
How to fit DevSecOps into CI/CD Pipelines

How to fit DevSecOps into CI/CD Pipelines

9
Comments
5 min read
Public key cryptography: OpenSSH private keys
Cover image for Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

4
Comments
14 min read
Creando Sistemas Auditables con ASP.NET Core - Parte 7: Auditoría con Audit.NET

Creando Sistemas Auditables con ASP.NET Core - Parte 7: Auditoría con Audit.NET

25
Comments 8
11 min read
loading...