Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Is Hacking Possible? Security Vulnerabilities and Defense

Is Hacking Possible? Security Vulnerabilities and Defense

Comments
8 min read
Server Security: 5 Essential Strategies to Fortify Your Infrastructure

Server Security: 5 Essential Strategies to Fortify Your Infrastructure

Comments
2 min read
Setting Up ClamAV for AWS - File Scan

Setting Up ClamAV for AWS - File Scan

Comments
2 min read
How to Increase API Performance

How to Increase API Performance

Comments
12 min read
Top 7 API Authentication Methods Compared

Top 7 API Authentication Methods Compared

Comments
14 min read
10 Best Practices for API Rate Limiting in 2025

10 Best Practices for API Rate Limiting in 2025

Comments
15 min read
6 Must-Have Features of an API Gateway

6 Must-Have Features of an API Gateway

Comments
10 min read
RBAC Analytics: Key Metrics to Monitor

RBAC Analytics: Key Metrics to Monitor

Comments
5 min read
The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

Comments
9 min read
Kubernetes Security: Protecting Your Cluster Like Fort Knox 🔐

Kubernetes Security: Protecting Your Cluster Like Fort Knox 🔐

Comments
3 min read
The Cybersecurity Risks of AI-Generated Code: What You Need to Know

The Cybersecurity Risks of AI-Generated Code: What You Need to Know

6
Comments
3 min read
How to Secure Your Web App with JWT, OAuth, and Role-Based Access Control

How to Secure Your Web App with JWT, OAuth, and Role-Based Access Control

Comments
3 min read
Security Protocols

Security Protocols

Comments
1 min read
Top 5 Cloud Storage Security Risks (and How to Avoid Them)

Top 5 Cloud Storage Security Risks (and How to Avoid Them)

Comments
12 min read
ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes

ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes

Comments
3 min read
Secure Terraform AWSCC provider resources with Guard Hooks

Secure Terraform AWSCC provider resources with Guard Hooks

Comments
5 min read
JWT Authentication & Authorization in ASP.NET

JWT Authentication & Authorization in ASP.NET

Comments 1
4 min read
Novel Optimization Algorithms: From Entertainment to Military Applications

Novel Optimization Algorithms: From Entertainment to Military Applications

Comments
1 min read
"KQL Showdown: distinct vs project"

"KQL Showdown: distinct vs project"

Comments
1 min read
Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

1
Comments
3 min read
Isolating AI Agents with DevContainer: A secure and scalable approach

Isolating AI Agents with DevContainer: A secure and scalable approach

3
Comments 1
3 min read
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

Comments
2 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
GDPR Compliant Logging in NestJS: Masking User Data in Real Time

GDPR Compliant Logging in NestJS: Masking User Data in Real Time

1
Comments
5 min read
Security news weekly round-up - 14th February 2025

Security news weekly round-up - 14th February 2025

1
Comments
4 min read
loading...