Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CORS, Preflight request and OPTIONS Method
Cover image for CORS, Preflight request and OPTIONS Method

CORS, Preflight request and OPTIONS Method

8
Comments
5 min read
Helpot ohjeet salasanamanagerin käyttöön

Helpot ohjeet salasanamanagerin käyttöön

4
Comments 1
4 min read
IAANSEC | WannaCry Analysis Report
Cover image for IAANSEC | WannaCry Analysis Report

IAANSEC | WannaCry Analysis Report

7
Comments
7 min read
Event-Driven serverless architecture to automatically remediate security findings

Event-Driven serverless architecture to automatically remediate security findings

16
Comments
6 min read
Authentication Patterns and Best Practices For SPAs
Cover image for Authentication Patterns and Best Practices For SPAs

Authentication Patterns and Best Practices For SPAs

14
Comments
11 min read
Secure your Kubernetes secrets easily with Trousseau
Cover image for Secure your Kubernetes secrets easily with Trousseau

Secure your Kubernetes secrets easily with Trousseau

6
Comments
2 min read
Power of AWS Organization ID in controlling access to AWS resources
Cover image for Power of AWS Organization ID in controlling access to AWS resources

Power of AWS Organization ID in controlling access to AWS resources

15
Comments
4 min read
Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability
Cover image for Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability

Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability

7
Comments
5 min read
Another cheat sheet for Dependabot

Another cheat sheet for Dependabot

21
Comments
4 min read
What is Cybersecurity? Its types, advantages and importance.

What is Cybersecurity? Its types, advantages and importance.

8
Comments
7 min read
Autenticación y Autorización con JWT en ASP.NET Core (Parte 5)

Autenticación y Autorización con JWT en ASP.NET Core (Parte 5)

26
Comments 5
11 min read
2FA Login Plugin Featuring TOTP
Cover image for 2FA Login Plugin Featuring TOTP

2FA Login Plugin Featuring TOTP

10
Comments
6 min read
New to Cloud or Cloud Security?

New to Cloud or Cloud Security?

4
Comments
3 min read
OAuth and OIDC: What You Need To Know
Cover image for OAuth and OIDC: What You Need To Know

OAuth and OIDC: What You Need To Know

8
Comments 1
11 min read
Insomni’Hack : un résumé des confs que nous avons vu
Cover image for Insomni’Hack : un résumé des confs que nous avons vu

Insomni’Hack : un résumé des confs que nous avons vu

4
Comments
3 min read
An Introduction to PCI Compliance

An Introduction to PCI Compliance

13
Comments 1
7 min read
🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)
Cover image for 🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)

🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)

5
Comments 2
2 min read
Detection of Malicious Content in Files Uploaded to S3 Bucket
Cover image for Detection of Malicious Content in Files Uploaded to S3 Bucket

Detection of Malicious Content in Files Uploaded to S3 Bucket

8
Comments
8 min read
Finding and Fixing Cloud Misconfigurations with open source

Finding and Fixing Cloud Misconfigurations with open source

8
Comments
3 min read
Maybe Passwords are the Future

Maybe Passwords are the Future

3
Comments 2
6 min read
Why APIs have become a security nightmare for SMBs and enterprises
Cover image for Why APIs have become a security nightmare for SMBs and enterprises

Why APIs have become a security nightmare for SMBs and enterprises

15
Comments
3 min read
GraphQL and Security implications
Cover image for GraphQL and Security implications

GraphQL and Security implications

32
Comments 2
7 min read
Improving policy readability with NotAction

Improving policy readability with NotAction

6
Comments
4 min read
🦾 Dependency management automation with Dependabot
Cover image for 🦾 Dependency management automation with Dependabot

🦾 Dependency management automation with Dependabot

5
Comments
1 min read
Operational best practices for AWS Well-Architected Framework
Cover image for Operational best practices for AWS Well-Architected Framework

Operational best practices for AWS Well-Architected Framework

11
Comments
3 min read
loading...