Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
OWASP Dependency Check on Azure DevOps
Cover image for OWASP Dependency Check on Azure DevOps

OWASP Dependency Check on Azure DevOps

Comments
4 min read
OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks
Cover image for OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

1
Comments
3 min read
Java, Taint, and SAST: What is it and why do we need it?

Java, Taint, and SAST: What is it and why do we need it?

Comments
8 min read
Some data breach just exposed 50 million students

Some data breach just exposed 50 million students

Comments
2 min read
What to Expect in 2025?
Cover image for What to Expect in 2025?

What to Expect in 2025?

Comments 1
9 min read
Quantum Threat: Will Quantum Computers Break Crypto?
Cover image for Quantum Threat: Will Quantum Computers Break Crypto?

Quantum Threat: Will Quantum Computers Break Crypto?

Comments
4 min read
New AWS Management Console Feature: Simultaneous Sign-in for Multiple Identities
Cover image for New AWS Management Console Feature: Simultaneous Sign-in for Multiple Identities

New AWS Management Console Feature: Simultaneous Sign-in for Multiple Identities

2
Comments
3 min read
Serverless self-service IoT certificate management - Part 2
Cover image for Serverless self-service IoT certificate management - Part 2

Serverless self-service IoT certificate management - Part 2

2
Comments
8 min read
Leveraging Azure Key Vault for Secrets Management and Encryption

Leveraging Azure Key Vault for Secrets Management and Encryption

Comments
1 min read
Password Composition Policies Are Bad and Here's Why

Password Composition Policies Are Bad and Here's Why

Comments
9 min read
How to Change Your Password Securely

How to Change Your Password Securely

Comments
3 min read
Mastering MQTT Brokers: Best Practices for Secure IoT Device

Mastering MQTT Brokers: Best Practices for Secure IoT Device

1
Comments
1 min read
Understanding SSH: Secure Shell Protocol

Understanding SSH: Secure Shell Protocol

Comments
2 min read
Password Hashing and Data Integrity in Real-World Implementation

Password Hashing and Data Integrity in Real-World Implementation

20
Comments 1
2 min read
OpenTofu - Encrypted State + Git to Bootstrap Infrastructure
Cover image for OpenTofu - Encrypted State + Git to Bootstrap Infrastructure

OpenTofu - Encrypted State + Git to Bootstrap Infrastructure

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.