Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

1
Comments
3 min read
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

9
Comments
4 min read
Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
Best Practices for Storing and Securing Passwords: A Developer's Guide

Best Practices for Storing and Securing Passwords: A Developer's Guide

2
Comments
5 min read
⚡ Secure your containers faster—without disrupting your workflow

⚡ Secure your containers faster—without disrupting your workflow

1
Comments
3 min read
Does Patching Containers Feel Like Whack-a-Mole?

Does Patching Containers Feel Like Whack-a-Mole?

1
Comments
2 min read
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

1
Comments
3 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
BL-SOC01 - Jump Into SOC

BL-SOC01 - Jump Into SOC

2
Comments
5 min read
Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments 1
7 min read
ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

Comments
2 min read
Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Comments
2 min read
Why your environment variables aren’t safe

Why your environment variables aren’t safe

7
Comments
9 min read
Meet BeanoGuard – Your New Best Friend for Secure Passwords

Meet BeanoGuard – Your New Best Friend for Secure Passwords

2
Comments
2 min read
The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

Comments
4 min read
Understanding the STRIDE Function in Cybersecurity

Understanding the STRIDE Function in Cybersecurity

Comments
3 min read
Using YubiKeys for passwordless authentication in Cognito user pools

Using YubiKeys for passwordless authentication in Cognito user pools

6
Comments
6 min read
AWS security and compliance

AWS security and compliance

Comments 1
1 min read
Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

25
Comments 13
4 min read
Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
Google OIDC and Prompt Login

Google OIDC and Prompt Login

1
Comments
1 min read
RS Authenticator – Your Ultimate 2FA Security Solution!

RS Authenticator – Your Ultimate 2FA Security Solution!

Comments
1 min read
🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

1
Comments
3 min read
What is a Smurf Attack?

What is a Smurf Attack?

Comments
4 min read
loading...