Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building My First Web3 Application: A Journey into Decentralized Message Signing

Building My First Web3 Application: A Journey into Decentralized Message Signing

1
Comments 1
3 min read
API Gateways (Kong, Tyk, etc.)

API Gateways (Kong, Tyk, etc.)

1
Comments
6 min read
AI Gone Wild: When Images Trick Machines Into Hilarious Mistakes

AI Gone Wild: When Images Trick Machines Into Hilarious Mistakes

Comments
2 min read
7 CI/CD Security Best Practices to Focus on
Cover image for 7 CI/CD Security Best Practices to Focus on

7 CI/CD Security Best Practices to Focus on

1
Comments 1
4 min read
DORA Oversight Guide 2025: What JET Will Check
Cover image for DORA Oversight Guide 2025: What JET Will Check

DORA Oversight Guide 2025: What JET Will Check

4
Comments
7 min read
7 Tips for Securing Nginx with TLS and Fail2Ban on Production Servers

7 Tips for Securing Nginx with TLS and Fail2Ban on Production Servers

Comments
3 min read
AI Code Review: How to Make it Work for You

AI Code Review: How to Make it Work for You

2
Comments 2
5 min read
Secure SSH Monitoring with Real-time Telegram Alerts

Secure SSH Monitoring with Real-time Telegram Alerts

Comments
4 min read
Semgrep Newsletter | AI Code Assistant Research, Security Alerts, Quarterly Release and More
Cover image for Semgrep Newsletter | AI Code Assistant Research, Security Alerts, Quarterly Release and More

Semgrep Newsletter | AI Code Assistant Research, Security Alerts, Quarterly Release and More

1
Comments
5 min read
Passwordless SSH Setup in 5 Minutes (The Right Way in 2025)
Cover image for Passwordless SSH Setup in 5 Minutes (The Right Way in 2025)

Passwordless SSH Setup in 5 Minutes (The Right Way in 2025)

1
Comments
4 min read
Stop Waiting for the Alarm: Why You Need to Go Hunting for Hackers Yourself

Stop Waiting for the Alarm: Why You Need to Go Hunting for Hackers Yourself

Comments
3 min read
Πώς δουλεύει το JWT σε ένα Client Flow

Πώς δουλεύει το JWT σε ένα Client Flow

1
Comments
5 min read
Throwing The TEE Gauntlet - A Turnabout Security Challenge

Throwing The TEE Gauntlet - A Turnabout Security Challenge

3
Comments 7
3 min read
A Defense-in-Depth Strategy for Security, Privacy, and Confidentiality in Web3 - The Pace-Setting Approach of the Oasis Network
Cover image for A Defense-in-Depth Strategy for Security, Privacy, and Confidentiality in Web3 - The Pace-Setting Approach of the Oasis Network

A Defense-in-Depth Strategy for Security, Privacy, and Confidentiality in Web3 - The Pace-Setting Approach of the Oasis Network

13
Comments 1
5 min read
Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

Stop Storing Secrets in localStorage: Patterns for a Secure Digital ID Wallet

Comments 1
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.