Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
[DevSecOps] #2 まず見える化する
Cover image for [DevSecOps] #2 まず見える化する

[DevSecOps] #2 まず見える化する

5
Comments
1 min read
[DevSecOps] #1 ビジネスを加速する文化的処方箋
Cover image for [DevSecOps] #1 ビジネスを加速する文化的処方箋

[DevSecOps] #1 ビジネスを加速する文化的処方箋

4
Comments
1 min read
YANMSS (Yet Another New Mac Setup Script)!
Cover image for YANMSS (Yet Another New Mac Setup Script)!

YANMSS (Yet Another New Mac Setup Script)!

7
Comments
4 min read
Automatically upgrade security vulnerabilities with this Yarn audit fix alternative

Automatically upgrade security vulnerabilities with this Yarn audit fix alternative

6
Comments 1
2 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

7
Comments
4 min read
Introduction to Kerberos

Introduction to Kerberos

10
Comments 1
5 min read
We Can’t Talk About Privacy Without Developers
Cover image for We Can’t Talk About Privacy Without Developers

We Can’t Talk About Privacy Without Developers

7
Comments 2
10 min read
Weird Unicode Behaviors
Cover image for Weird Unicode Behaviors

Weird Unicode Behaviors

7
Comments
2 min read
Lodash: Understanding the recent vulnerability and how we can rally behind packages
Cover image for Lodash: Understanding the recent vulnerability and how we can rally behind packages

Lodash: Understanding the recent vulnerability and how we can rally behind packages

11
Comments
8 min read
PHP and Composer lovers, this if for you
Cover image for PHP and Composer lovers, this if for you

PHP and Composer lovers, this if for you

5
Comments
1 min read
Outsource Application Security: Should You Consider It?
Cover image for Outsource Application Security: Should You Consider It?

Outsource Application Security: Should You Consider It?

6
Comments 1
4 min read
A Brief Introduction to Securing Applications with JWT
Cover image for A Brief Introduction to Securing Applications with JWT

A Brief Introduction to Securing Applications with JWT

48
Comments 6
7 min read
Splunk: AWS CloudWatch Log Ingestion - Part 2 - Splunk Add-On for AWS

Splunk: AWS CloudWatch Log Ingestion - Part 2 - Splunk Add-On for AWS

5
Comments
10 min read
The EU Court of Justice invalidated the EU-US Data Protection Shield decision. Why is this important?

The EU Court of Justice invalidated the EU-US Data Protection Shield decision. Why is this important?

6
Comments 2
2 min read
Deep Dive into Container Security Scanning

Deep Dive into Container Security Scanning

1
Comments
1 min read
How to encrypt strings & files in your source code?
Cover image for How to encrypt strings & files in your source code?

How to encrypt strings & files in your source code?

144
Comments 16
5 min read
Why Twitter’s Hack Isn’t About Twitter or Bitcoin: It’s About Our Identity on the Internet
Cover image for Why Twitter’s Hack Isn’t About Twitter or Bitcoin: It’s About Our Identity on the Internet

Why Twitter’s Hack Isn’t About Twitter or Bitcoin: It’s About Our Identity on the Internet

6
Comments
4 min read
Pwnd Password Checking on the Edge
Cover image for Pwnd Password Checking on the Edge

Pwnd Password Checking on the Edge

7
Comments
6 min read
CTF.live - Secret in Claim
Cover image for CTF.live - Secret in Claim

CTF.live - Secret in Claim

2
Comments
3 min read
Dica Rápida: Protegendo senhas com BCrypt.Net
Cover image for Dica Rápida: Protegendo senhas com BCrypt.Net

Dica Rápida: Protegendo senhas com BCrypt.Net

34
Comments 2
3 min read
How do you talk about digital security with your friends and family?
Cover image for How do you talk about digital security with your friends and family?

How do you talk about digital security with your friends and family?

24
Comments 12
1 min read
The minimal server setup guide.
Cover image for The minimal server setup guide.

The minimal server setup guide.

30
Comments 1
2 min read
Splunk: AWS CloudWatch Log Ingestion - Part 1 - Introduction & Setup

Splunk: AWS CloudWatch Log Ingestion - Part 1 - Introduction & Setup

4
Comments
3 min read
Best Practices for Onboarding Security & Compliance Scanning Tools
Cover image for Best Practices for Onboarding Security & Compliance Scanning Tools

Best Practices for Onboarding Security & Compliance Scanning Tools

9
Comments
4 min read
Live Exploiting Your Open Source Dependencies with Brian Vermeer
Cover image for Live Exploiting Your Open Source Dependencies with Brian Vermeer
17:46

Live Exploiting Your Open Source Dependencies with Brian Vermeer

67
Comments 39
1 min read
loading...