Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Endpoint Security: A Low-Cost Data Diode
Cover image for Endpoint Security: A Low-Cost Data Diode

Endpoint Security: A Low-Cost Data Diode

3
Comments
3 min read
Case Study: Building Enterprise-Grade AWS Infrastructure for Accolade
Cover image for Case Study: Building Enterprise-Grade AWS Infrastructure for Accolade

Case Study: Building Enterprise-Grade AWS Infrastructure for Accolade

4
Comments
3 min read
AWS Shared Responsibility Model and Security Principles
Cover image for AWS Shared Responsibility Model and Security Principles

AWS Shared Responsibility Model and Security Principles

Comments
3 min read
The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

Comments
2 min read
Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?
Cover image for Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Comments
10 min read
How Two-Factor Authentication Apps Work Without an Internet Connection
Cover image for How Two-Factor Authentication Apps Work Without an Internet Connection

How Two-Factor Authentication Apps Work Without an Internet Connection

1
Comments
3 min read
Secure Key-Value Store for Raspberry Pi Pico
Cover image for Secure Key-Value Store for Raspberry Pi Pico

Secure Key-Value Store for Raspberry Pi Pico

Comments
4 min read
Responsible AI: The Ethical Framework for Modern Development

Responsible AI: The Ethical Framework for Modern Development

1
Comments
8 min read
Stealthy FortiGate Backdoor: SSL-VPN Symlink Exploit Bypasses Patches

Stealthy FortiGate Backdoor: SSL-VPN Symlink Exploit Bypasses Patches

Comments
4 min read
CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!
Cover image for CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!

CoreIdent Phase 3 Milestone: OAuth 2.0 Authorization Code Flow & Token Security Hardened!

Comments
3 min read
Logs, Metrics, Traces… Leaks? The Case for Auditable Observability
Cover image for Logs, Metrics, Traces… Leaks? The Case for Auditable Observability

Logs, Metrics, Traces… Leaks? The Case for Auditable Observability

3
Comments
4 min read
Basic API Security Testing Checklist for Developers and Pentesters

Basic API Security Testing Checklist for Developers and Pentesters

1
Comments 1
3 min read
Firewall Policies & NAT: Mastering Security and Network Flow

Firewall Policies & NAT: Mastering Security and Network Flow

Comments
3 min read
Securing Docker Networking: Limiting Exposure and Enhancing Isolation
Cover image for Securing Docker Networking: Limiting Exposure and Enhancing Isolation

Securing Docker Networking: Limiting Exposure and Enhancing Isolation

Comments
3 min read
Restricting Container Capabilities: Reducing the Kernel Attack Surface in Docker
Cover image for Restricting Container Capabilities: Reducing the Kernel Attack Surface in Docker

Restricting Container Capabilities: Reducing the Kernel Attack Surface in Docker

Comments
4 min read
Securing Docker Images: Best Practices for a Hardened Container Build
Cover image for Securing Docker Images: Best Practices for a Hardened Container Build

Securing Docker Images: Best Practices for a Hardened Container Build

Comments
4 min read
Container Isolation: Understanding Namespaces and Control Groups in Docker
Cover image for Container Isolation: Understanding Namespaces and Control Groups in Docker

Container Isolation: Understanding Namespaces and Control Groups in Docker

1
Comments
4 min read
Understanding Docker Security Basics: Building a Strong Foundation
Cover image for Understanding Docker Security Basics: Building a Strong Foundation

Understanding Docker Security Basics: Building a Strong Foundation

2
Comments
4 min read
How to Customize ASP.NET Core Identity With EF Core for Your Project Needs
Cover image for How to Customize ASP.NET Core Identity With EF Core for Your Project Needs

How to Customize ASP.NET Core Identity With EF Core for Your Project Needs

1
Comments 2
9 min read
CryptoRave, BSides, DevOpsDays e o impacto de participar de eventos de Tecnologia

CryptoRave, BSides, DevOpsDays e o impacto de participar de eventos de Tecnologia

3
Comments
2 min read
Segurança no Desenvolvimento: Da Teoria Ă  Prática – Introdução

Segurança no Desenvolvimento: Da Teoria Ă  Prática – Introdução

7
Comments
2 min read
Chaos Engineering: Breaking Things On Purpose
Cover image for Chaos Engineering: Breaking Things On Purpose

Chaos Engineering: Breaking Things On Purpose

2
Comments 1
6 min read
How to Prevent Disasters in Laravel (A Critical Tip for Professional Developers)
Cover image for How to Prevent Disasters in Laravel (A Critical Tip for Professional Developers)

How to Prevent Disasters in Laravel (A Critical Tip for Professional Developers)

3
Comments
2 min read
How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods
Cover image for How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods

How to Identify Malicious Content: Key Behavioral Patterns and Dissemination Methods

1
Comments
4 min read
The Sender Policy Framework: Bare Bone Essentials
Cover image for The Sender Policy Framework: Bare Bone Essentials

The Sender Policy Framework: Bare Bone Essentials

6
Comments 2
3 min read
loading...