Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Defending Your API: Essential Strategies Against Brute Force Attacks

Defending Your API: Essential Strategies Against Brute Force Attacks

Comments
13 min read
Session Hijacking In the API Era: Your Complete Defense Strategy

Session Hijacking In the API Era: Your Complete Defense Strategy

Comments
11 min read
Protecting Sensitive Data in API Logs

Protecting Sensitive Data in API Logs

Comments
9 min read
🦅 Falco: Must-know for CKS exam

🦅 Falco: Must-know for CKS exam

1
Comments
4 min read
Don't Get Rate-Limited: Use Let's Encrypt Staging

Don't Get Rate-Limited: Use Let's Encrypt Staging

21
Comments 13
3 min read
RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

RSA Plans, Vibe Coding, AppSec Industry Survey, Anthropic and a CVE for vLLM

3
Comments 1
6 min read
Zero Trust API Security: Never Trust, Always Protect

Zero Trust API Security: Never Trust, Always Protect

Comments
10 min read
Protecting Your APIs from Insider Threats: The Access Control Playbook

Protecting Your APIs from Insider Threats: The Access Control Playbook

Comments
10 min read
Vibe Coding with AI? Don't Forget These Security Fundamentals

Vibe Coding with AI? Don't Forget These Security Fundamentals

1
Comments
2 min read
🔐 I Built a JavaScript Web Vulnerability Scanner Devs Can Actually Use (CLI, Web UI, and AI-Powered Fixes)

🔐 I Built a JavaScript Web Vulnerability Scanner Devs Can Actually Use (CLI, Web UI, and AI-Powered Fixes)

1
Comments 1
2 min read
Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

21
Comments
3 min read
If You Can't Control Access, You Can't Control the Cloud (Part 1)

If You Can't Control Access, You Can't Control the Cloud (Part 1)

3
Comments 1
6 min read
Understanding Kubernetes RBAC

Understanding Kubernetes RBAC

Comments
3 min read
Your First Steps to a Hardened SSH Server

Your First Steps to a Hardened SSH Server

Comments
6 min read
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Comments
3 min read
Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

1
Comments
13 min read
Mastering XSS Prevention: Tips for Developers

Mastering XSS Prevention: Tips for Developers

Comments
12 min read
How to Secure AWS Lambda Webhooks With Signature Verification

How to Secure AWS Lambda Webhooks With Signature Verification

Comments
2 min read
User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

7
Comments
5 min read
Understanding XSRF Protection: Implementation in Fetch vs. Axios

Understanding XSRF Protection: Implementation in Fetch vs. Axios

5
Comments 2
7 min read
The Rising Threat of DDoS Attacks: What You Need to Know

The Rising Threat of DDoS Attacks: What You Need to Know

1
Comments
3 min read
What is Security? The Basics You Need to Know - Code Bastion

What is Security? The Basics You Need to Know - Code Bastion

Comments
5 min read
API Security: The First Steps Toward a Fortified Backend

API Security: The First Steps Toward a Fortified Backend

Comments
3 min read
Snyk and Sonar : committed credentials security test

Snyk and Sonar : committed credentials security test

4
Comments
6 min read
Why do we need OAuth ?

Why do we need OAuth ?

7
Comments
2 min read
loading...