Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
encodeURIComponent is both not safe enough, and overdone

encodeURIComponent is both not safe enough, and overdone

9
Comments
1 min read
How to protect your JS ?

How to protect your JS ?

5
Comments 11
1 min read
Vuls: Open-source vulnerability scanner

Vuls: Open-source vulnerability scanner

7
Comments
4 min read
7 Mobile App Security Risks and How to Mitigate Them
Cover image for 7 Mobile App Security Risks and How to Mitigate Them

7 Mobile App Security Risks and How to Mitigate Them

14
Comments
8 min read
Protecting Against XSS Attacks in React
Cover image for Protecting Against XSS Attacks in React

Protecting Against XSS Attacks in React

42
Comments
4 min read
Trust, But Verify (Downloads)
Cover image for Trust, But Verify (Downloads)

Trust, But Verify (Downloads)

8
Comments 1
2 min read
Windows Hot Patching Mechanism Explained
Cover image for Windows Hot Patching Mechanism Explained

Windows Hot Patching Mechanism Explained

16
Comments
5 min read
How to use Snyk for fixing node module vulnerabilities

How to use Snyk for fixing node module vulnerabilities

15
Comments 3
8 min read
Spring Boot and Multiple Authentication Profiles (None, Password & Okta)
Cover image for Spring Boot and Multiple Authentication Profiles (None, Password & Okta)

Spring Boot and Multiple Authentication Profiles (None, Password & Okta)

3
Comments 2
2 min read
Using Environment Variables in NodeJS, and why we want to use them.

Using Environment Variables in NodeJS, and why we want to use them.

8
Comments
2 min read
Top 10 Reverse Engineering Tools
Cover image for Top 10 Reverse Engineering Tools

Top 10 Reverse Engineering Tools

61
Comments
3 min read
Thoughts on Passwordless Authentication
Cover image for Thoughts on Passwordless Authentication

Thoughts on Passwordless Authentication

5
Comments 1
4 min read
7 Top Benefits of Outsourcing Security Services
Cover image for 7 Top Benefits of Outsourcing Security Services

7 Top Benefits of Outsourcing Security Services

11
Comments
6 min read
How to add Kerberos Authentication to Your Site With Minimum Efforts

How to add Kerberos Authentication to Your Site With Minimum Efforts

10
Comments
2 min read
How SHA-2 Works Step-By-Step (SHA-256)

How SHA-2 Works Step-By-Step (SHA-256)

103
Comments 1
9 min read
Secure your Data API from Web Scrapers
Cover image for Secure your Data API from Web Scrapers

Secure your Data API from Web Scrapers

157
Comments 10
5 min read
How to TPM - Part 2 : TPM Software Stack
Cover image for How to TPM - Part 2 : TPM Software Stack

How to TPM - Part 2 : TPM Software Stack

13
Comments 1
3 min read
Dotenv - Dealing with Environment variables.
Cover image for Dotenv - Dealing with Environment variables.

Dotenv - Dealing with Environment variables.

13
Comments 1
3 min read
SSL/TLS Vulnerabilities

SSL/TLS Vulnerabilities

26
Comments
2 min read
Social Engineering: The performance security
Cover image for Social Engineering: The performance security

Social Engineering: The performance security

20
Comments
5 min read
Security news weekly round-up - 10th July 2020
Cover image for Security news weekly round-up - 10th July 2020

Security news weekly round-up - 10th July 2020

5
Comments
5 min read
What everyone must know about front end security?
Cover image for What everyone must know about front end security?

What everyone must know about front end security?

8
Comments
5 min read
How safe is same-origin client-server communication?

How safe is same-origin client-server communication?

4
Comments 8
1 min read
If your open source dependencies are a mess, we’ve got you. Introducing catalogs.

If your open source dependencies are a mess, we’ve got you. Introducing catalogs.

23
Comments
6 min read
4 Key Benefits of Managed Security Service Provider (MSSP)
Cover image for 4 Key Benefits of Managed Security Service Provider (MSSP)

4 Key Benefits of Managed Security Service Provider (MSSP)

5
Comments
3 min read
loading...