Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
10 Rules for Protecting your Computer from Malware

10 Rules for Protecting your Computer from Malware

4
Comments
4 min read
Securing Single-page Applications with OpenID Connect

Securing Single-page Applications with OpenID Connect

4
Comments
1 min read
I Clicked On A Facebook Scam To See What Would Happen

I Clicked On A Facebook Scam To See What Would Happen

47
Comments 27
6 min read
Data security in multi-tenant SaaS applications

Data security in multi-tenant SaaS applications

22
Comments
4 min read
HoneyDocker

HoneyDocker

5
Comments
10 min read
Implementing Type Classes for Verifying Cryptography

Implementing Type Classes for Verifying Cryptography

1
Comments
2 min read
GitHub security: what does it take to protect your company from credentials leaking on GitHub?

GitHub security: what does it take to protect your company from credentials leaking on GitHub?

3
Comments
7 min read
Secure Quiz platform

Secure Quiz platform

2
Comments
1 min read
Writing software for a malicious world

Writing software for a malicious world

12
Comments
3 min read
Secure way of doing OAuth for SPA & Native Apps

Secure way of doing OAuth for SPA & Native Apps

23
Comments
3 min read
How to handle PII in websites and web apps

How to handle PII in websites and web apps

6
Comments
7 min read
Vulnerability Management: 5 Best Practices to Protect Your Business

Vulnerability Management: 5 Best Practices to Protect Your Business

7
Comments
9 min read
Differences Between Static Code Analysis and Dynamic Testing

Differences Between Static Code Analysis and Dynamic Testing

6
Comments
5 min read
What is SQL injection and how do I avoid it in Go?

What is SQL injection and how do I avoid it in Go?

15
Comments 7
5 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

9
Comments
3 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

5
Comments
3 min read
Microsoft is absolutely at fault for WannaCry

Microsoft is absolutely at fault for WannaCry

13
Comments 32
4 min read
Securing GraphQL API from malicious queries

Securing GraphQL API from malicious queries

16
Comments
6 min read
The Impact of Security Misconfiguration and Its Mitigation

The Impact of Security Misconfiguration and Its Mitigation

2
Comments
4 min read
5 DevOps Monitoring Strategies for Your Application

5 DevOps Monitoring Strategies for Your Application

39
Comments
7 min read
DockerCon 2017 recap

DockerCon 2017 recap

16
Comments
3 min read
Recipe for Infection: Ransomware

Recipe for Infection: Ransomware

12
Comments
3 min read
Predictive vs. Adaptive SDLC: What is the Difference?

Predictive vs. Adaptive SDLC: What is the Difference?

2
Comments
5 min read
A Strategy for Passing AWS Certifications

A Strategy for Passing AWS Certifications

6
Comments 1
4 min read
Evil Session Tokens

Evil Session Tokens

13
Comments 12
2 min read
loading...