Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is DevSecOps, and How Does it Help Build Secure Web Applications?
Cover image for What is DevSecOps, and How Does it Help Build Secure Web Applications?

What is DevSecOps, and How Does it Help Build Secure Web Applications?

6
Comments
6 min read
Work From Home: Home Office Security Tips

Work From Home: Home Office Security Tips

4
Comments 2
1 min read
Increasing the Security of the InterSystems IRIS DBMS

Increasing the Security of the InterSystems IRIS DBMS

6
Comments
6 min read
Stop Guessing: What is a JWT?
Cover image for Stop Guessing: What is a JWT?

Stop Guessing: What is a JWT?

154
Comments 13
5 min read
Cross Domain Security

Cross Domain Security

2
Comments
1 min read
Prevent AWS from Reading Your Step Functions Data

Prevent AWS from Reading Your Step Functions Data

22
Comments 2
5 min read
Advantages of a Secure Software Development Life Cycle (SDLC)
Cover image for Advantages of a Secure Software Development Life Cycle (SDLC)

Advantages of a Secure Software Development Life Cycle (SDLC)

8
Comments
5 min read
LGPD - Parte I - Introdução

LGPD - Parte I - Introdução

5
Comments
3 min read
Webview I wanted to see, and some requested features

Webview I wanted to see, and some requested features

4
Comments
2 min read
How to Build a Token Server for Agora Applications using GoLang
Cover image for How to Build a Token Server for Agora Applications using GoLang

How to Build a Token Server for Agora Applications using GoLang

8
Comments
10 min read
Why Do We Need Cyber ​​Security?
Cover image for Why Do We Need Cyber ​​Security?

Why Do We Need Cyber ​​Security?

3
Comments 1
1 min read
What is an Agile SDLC Model and What Are its Advantages?
Cover image for What is an Agile SDLC Model and What Are its Advantages?

What is an Agile SDLC Model and What Are its Advantages?

6
Comments
5 min read
How to Make an Interactive Todo List CLI using Python with an Easy Login Mechanism
Cover image for How to Make an Interactive Todo List CLI using Python with an Easy Login Mechanism

How to Make an Interactive Todo List CLI using Python with an Easy Login Mechanism

48
Comments 3
10 min read
Web server PenetrationTesting checklist

Web server PenetrationTesting checklist

26
Comments
4 min read
Microsoft Azure's Privileged Identity Management
Cover image for Microsoft Azure's Privileged Identity Management

Microsoft Azure's Privileged Identity Management

4
Comments
3 min read
HarperDB's New Approach to Role Permissions
Cover image for HarperDB's New Approach to Role Permissions

HarperDB's New Approach to Role Permissions

38
Comments
3 min read
How to spot and exploit postMessage vulnerablities?
Cover image for How to spot and exploit postMessage vulnerablities?

How to spot and exploit postMessage vulnerablities?

7
Comments
3 min read
How to turn a credentials breach in a development opportunity
Cover image for How to turn a credentials breach in a development opportunity

How to turn a credentials breach in a development opportunity

4
Comments
3 min read
How 4 lines of Java code end up in 518772 lines in production.
Cover image for How 4 lines of Java code end up in 518772 lines in production.

How 4 lines of Java code end up in 518772 lines in production.

60
Comments 13
3 min read
CVE Binary Tool: GSoC Final Report
Cover image for CVE Binary Tool: GSoC Final Report

CVE Binary Tool: GSoC Final Report

7
Comments 1
6 min read
Spring security with JWT based login [Without OAuth]

Spring security with JWT based login [Without OAuth]

3
Comments
1 min read
CORS in short
Cover image for CORS in short

CORS in short

8
Comments
1 min read
3 Static Application Security Testing advantages (SAST) You Should Know
Cover image for 3 Static Application Security Testing advantages (SAST) You Should Know

3 Static Application Security Testing advantages (SAST) You Should Know

8
Comments 1
4 min read
Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more
Cover image for Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more

Today's rabbit hole: securing JWTs for authentication, httpOnly cookies, CSRF tokens, secrets & more

44
Comments 9
11 min read
Fundamentals of Vulnerability Management with Open Source Tools

Fundamentals of Vulnerability Management with Open Source Tools

3
Comments 2
8 min read
loading...