Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

Comments
1 min read
Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Comments
3 min read
No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

4
Comments
2 min read
How to Use .env Securely in DevOps Projects

How to Use .env Securely in DevOps Projects

6
Comments
2 min read
🔒 Bandit: Python Static Application Security Testing Guide

🔒 Bandit: Python Static Application Security Testing Guide

1
Comments 1
3 min read
🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

Comments
2 min read
How does BCrypt Verification work?

How does BCrypt Verification work?

Comments
4 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

14
Comments 3
3 min read
Best DAM Software for Organizing Media on NAS (2025 Guide)

Best DAM Software for Organizing Media on NAS (2025 Guide)

1
Comments
4 min read
Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Comments
1 min read
Why can deleted files be recovered?

Why can deleted files be recovered?

Comments
5 min read
Penetration Testing for API Security: Protecting Digital Gateways

Penetration Testing for API Security: Protecting Digital Gateways

3
Comments
12 min read
How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

Comments
2 min read
Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

15
Comments
2 min read
2-Factor Authentication OTP: TOTP & HOTP Algorithms

2-Factor Authentication OTP: TOTP & HOTP Algorithms

Comments
6 min read
MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

6
Comments
8 min read
The Security Crisis: How Tanzu Spring Is Changing the Game

The Security Crisis: How Tanzu Spring Is Changing the Game

3
Comments
3 min read
Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Comments
1 min read
The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

Comments
4 min read
Understanding NACLs with AWS EC2 instances 🚀

Understanding NACLs with AWS EC2 instances 🚀

5
Comments
6 min read
Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

1
Comments
2 min read
🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game

🏰 Castle of Keys: API-First Access Control in a Physical-Digital Game

58
Comments 22
4 min read
Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Comments
3 min read
Going Deeper with Keycloak: Understanding Authorization Services

Going Deeper with Keycloak: Understanding Authorization Services

1
Comments
6 min read
loading...