Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Simple Authentication with Spring Security

Simple Authentication with Spring Security

13
Comments 1
12 min read
AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

7
Comments
5 min read
6 Ways We Get Things Done with Python

6 Ways We Get Things Done with Python

11
Comments
3 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Content-Security-Policy in ASP.NET MVC

Content-Security-Policy in ASP.NET MVC

7
Comments
3 min read
Privacy and Security Series, Part II: Multi-factor Authentication

Privacy and Security Series, Part II: Multi-factor Authentication

6
Comments
9 min read
Exploiting Common Serverless Security Flaws in AWS

Exploiting Common Serverless Security Flaws in AWS

7
Comments 2
11 min read
OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

10
Comments 1
5 min read
Security in CI/CD

Security in CI/CD

8
Comments
1 min read
The Difference Between Malware, Viruses and Ransomware Explained

The Difference Between Malware, Viruses and Ransomware Explained

18
Comments
2 min read
SSL Certificates in Development

SSL Certificates in Development

6
Comments
3 min read
Improving security in ASP.NET MVC using custom headers

Improving security in ASP.NET MVC using custom headers

30
Comments 6
4 min read
Q Vault: An open source secret manager

Q Vault: An open source secret manager

7
Comments 27
1 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Explain Blockchain Like I'm Five

Explain Blockchain Like I'm Five

16
Comments 2
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Sneaky Fingerprint and IP Tracker with React

Sneaky Fingerprint and IP Tracker with React

53
Comments 1
4 min read
Possibly Odd Approach for Quick Authentication - User Registry API and Passport

Possibly Odd Approach for Quick Authentication - User Registry API and Passport

31
Comments
6 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
Introduction to computer forensics

Introduction to computer forensics

123
Comments 11
5 min read
Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

17
Comments
2 min read
Explain User Token Authentication Like I'm Five

Explain User Token Authentication Like I'm Five

12
Comments 3
1 min read
Let's Encrypt: Wildcard Certificate With Certbot

Let's Encrypt: Wildcard Certificate With Certbot

139
Comments 27
3 min read
How to Create Role based Authorization Middleware with Casbin and Nest.js

How to Create Role based Authorization Middleware with Casbin and Nest.js

44
Comments
2 min read
Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

35
Comments 1
4 min read
loading...