Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Three steps to better account security
Cover image for Three steps to better account security

Three steps to better account security

37
Comments
3 min read
Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)
Cover image for Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)

Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)

5
Comments
9 min read
Magic Link Login: Simple, Easy and Secure
Cover image for Magic Link Login: Simple, Easy and Secure

Magic Link Login: Simple, Easy and Secure

11
Comments
5 min read
🚔 Policing with Amazon Macie - Security & Compliance
Cover image for 🚔 Policing with Amazon Macie - Security & Compliance

🚔 Policing with Amazon Macie - Security & Compliance

9
Comments 3
3 min read
Acra. Features: Database request firewall
Cover image for Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Content Security Policy with PHP
Cover image for Content Security Policy with PHP

Content Security Policy with PHP

6
Comments
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io

Creating an end-to-end encrypted chat with GetStream.io and seald.io

16
Comments
8 min read
From Software Developer to Ethical Hacker
Cover image for From Software Developer to Ethical Hacker

From Software Developer to Ethical Hacker

21
Comments 3
3 min read
How to remove Nginx server version and name.
Cover image for How to remove Nginx server  version and  name.

How to remove Nginx server version and name.

17
Comments
3 min read
PwnKit, or how 12-year-old code can give root to unprivileged users
Cover image for PwnKit, or how 12-year-old code can give root to unprivileged users

PwnKit, or how 12-year-old code can give root to unprivileged users

6
Comments
3 min read
How to Mitigate IoT Security Threats in 2022
Cover image for How to Mitigate IoT Security Threats in 2022

How to Mitigate IoT Security Threats in 2022

9
Comments
6 min read
Creating a simple REST API in Deno
Cover image for Creating a simple REST API in Deno

Creating a simple REST API in Deno

7
Comments
8 min read
How to Secure your NodeJs Express Javascript Application - part 2
Cover image for How to Secure your NodeJs Express Javascript Application - part 2

How to Secure your NodeJs Express Javascript Application - part 2

14
Comments
5 min read
What are policies and how do you use them with CloudQuery?

What are policies and how do you use them with CloudQuery?

3
Comments
6 min read
Authenticate third-party API's in Next.js using HttpOnly cookies and axios interceptors
Cover image for Authenticate third-party API's in Next.js using HttpOnly cookies and axios interceptors

Authenticate third-party API's in Next.js using HttpOnly cookies and axios interceptors

10
Comments
7 min read
User Office Hours: Introduction to Snyk Code

User Office Hours: Introduction to Snyk Code

Comments
1 min read
Cyber Security: A run through.
Cover image for Cyber Security: A run through.

Cyber Security: A run through.

49
Comments 6
6 min read
AWS CLI - do it right
Cover image for AWS CLI - do it right

AWS CLI - do it right

12
Comments
9 min read
Creating a Certificate Authority for testing with Azure Container Instances
Cover image for Creating a Certificate Authority for testing with Azure Container Instances

Creating a Certificate Authority for testing with Azure Container Instances

6
Comments
7 min read
Managing service accounts with Terraform for GCP

Managing service accounts with Terraform for GCP

3
Comments
2 min read
AWS Cognito JWT Verification
Cover image for AWS Cognito JWT Verification

AWS Cognito JWT Verification

3
Comments
1 min read
Managing Access Tokens in React or React Native with Axios and Context API.
Cover image for Managing Access Tokens in React or React Native with Axios and Context API.

Managing Access Tokens in React or React Native with Axios and Context API.

7
Comments
2 min read
How to securely use Google API service account credentials in a public repo

How to securely use Google API service account credentials in a public repo

11
Comments
3 min read
Win free swag by fixing security vulnerabilities
Cover image for Win free swag by fixing security vulnerabilities

Win free swag by fixing security vulnerabilities

8
Comments 1
2 min read
What causes imposter syndrome among software developers?
Cover image for What causes imposter syndrome among software developers?

What causes imposter syndrome among software developers?

7
Comments
2 min read
loading...