Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing RMarkdown Documents
Cover image for Securing RMarkdown Documents

Securing RMarkdown Documents

5
Comments
1 min read
'Code injection' in AWS CodePipeline
Cover image for 'Code injection' in AWS CodePipeline

'Code injection' in AWS CodePipeline

7
Comments 6
4 min read
Create a React App with Biometric Authentication
Cover image for Create a React App with Biometric Authentication

Create a React App with Biometric Authentication

7
Comments
7 min read
Use ZAP to Perform DAST (Dynamic Application Security Testing)

Use ZAP to Perform DAST (Dynamic Application Security Testing)

8
Comments 1
5 min read
How to Safely Share Passwords and Secrets Codes Online
Cover image for How to Safely Share Passwords and Secrets Codes Online

How to Safely Share Passwords and Secrets Codes Online

4
Comments
3 min read
Read-only buckets in shared AWS accounts
Cover image for Read-only buckets in shared AWS accounts

Read-only buckets in shared AWS accounts

5
Comments
5 min read
When Package Dependencies Become Problematic
Cover image for When Package Dependencies Become Problematic

When Package Dependencies Become Problematic

6
Comments
6 min read
AWS Inspector and AWS Config - step by step towards more security
Cover image for AWS Inspector and AWS Config - step by step towards more security

AWS Inspector and AWS Config - step by step towards more security

3
Comments
5 min read
Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins
Cover image for Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins

Add Password Protection to Any Site with OAuth2 Proxy - Plus Social Logins

2
Comments
7 min read
Secure your cloud with Cloudsploit!
Cover image for Secure your cloud with Cloudsploit!

Secure your cloud with Cloudsploit!

12
Comments
7 min read
Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does
Cover image for Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does

Why PyPI Doesn't Know Your Projects Dependencies but Thoth Does

7
Comments
5 min read
Hashing a Password in NodeJs

Hashing a Password in NodeJs

3
Comments
1 min read
Environment Variables in Python

Environment Variables in Python

6
Comments
1 min read
Sessions: cookies vs localStorage - which one to use when
Cover image for Sessions: cookies vs localStorage - which one to use when

Sessions: cookies vs localStorage - which one to use when

8
Comments
3 min read
Firewall: Egress Filtering with ufw

Firewall: Egress Filtering with ufw

4
Comments
4 min read
Security news weekly round-up - 11th February 2022
Cover image for Security news weekly round-up - 11th February 2022

Security news weekly round-up - 11th February 2022

Comments
4 min read
Effective Session Management using Supertokens
Cover image for Effective Session Management using Supertokens

Effective Session Management using Supertokens

134
Comments 3
7 min read
Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice

Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice

7
Comments
18 min read
Scan and secure AWS Lambda credentials like a pro!
Cover image for Scan and secure AWS Lambda credentials like a pro!

Scan and secure AWS Lambda credentials like a pro!

8
Comments
3 min read
Amazon CloudFront 🌩️ - An Global Edge Network
Cover image for Amazon CloudFront 🌩️ - An Global Edge Network

Amazon CloudFront 🌩️ - An Global Edge Network

14
Comments
2 min read
Add Hongkong Post Root CA certificate to Java keystore

Add Hongkong Post Root CA certificate to Java keystore

6
Comments
1 min read
Coordinated vulnerability disclosure (CVD) for open source projects

Coordinated vulnerability disclosure (CVD) for open source projects

11
Comments 3
9 min read
Automated attack synthesis by extracting protocol FSMs from RFCs
Cover image for Automated attack synthesis by extracting protocol FSMs from RFCs

Automated attack synthesis by extracting protocol FSMs from RFCs

13
Comments 2
8 min read
Web Cache Deception

Web Cache Deception

5
Comments
1 min read
Kubernetes Cluster Authentication using AWS IAM

Kubernetes Cluster Authentication using AWS IAM

8
Comments 1
3 min read
loading...