Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 18: Securing S3 Static Websites with CloudFront (HTTPS + OAC).
Cover image for Day 18: Securing S3 Static Websites with CloudFront (HTTPS + OAC).

Day 18: Securing S3 Static Websites with CloudFront (HTTPS + OAC).

Comments
1 min read
Tudo que vocĂȘ deve saber sobre prompt-injection (Golang)
Cover image for Tudo que vocĂȘ deve saber sobre prompt-injection (Golang)

Tudo que vocĂȘ deve saber sobre prompt-injection (Golang)

5
Comments 1
5 min read
82% of Organizations Were Breached Through Containers
Cover image for 82% of Organizations Were Breached Through Containers

82% of Organizations Were Breached Through Containers

Comments
3 min read
Fundamentos de AppSec: Protegiendo el CorazĂłn de tus Aplicaciones
Cover image for Fundamentos de AppSec: Protegiendo el CorazĂłn de tus Aplicaciones

Fundamentos de AppSec: Protegiendo el CorazĂłn de tus Aplicaciones

Comments
4 min read
Secure Like a Pro: 10 Advanced Techniques in Symfony
Cover image for Secure Like a Pro: 10 Advanced Techniques in Symfony

Secure Like a Pro: 10 Advanced Techniques in Symfony

3
Comments 2
8 min read
WorkSafeBC-oriented workflows without overclaims: structured summaries, careful language

WorkSafeBC-oriented workflows without overclaims: structured summaries, careful language

Comments
4 min read
Build a Complete PKI from Scratch in Node.js
Cover image for Build a Complete PKI from Scratch in Node.js

Build a Complete PKI from Scratch in Node.js

1
Comments
14 min read
đŸ§± Execution Is a System Boundary, Not a Feature

đŸ§± Execution Is a System Boundary, Not a Feature

1
Comments
1 min read
🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque
Cover image for 🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

Comments
3 min read
Laravel Policies: Centralize Your Authorization and Keep Your Controllers Clean

Laravel Policies: Centralize Your Authorization and Keep Your Controllers Clean

1
Comments
3 min read
I Open-Sourced a Tool to Detect Weak JWT Secrets 🔐

I Open-Sourced a Tool to Detect Weak JWT Secrets 🔐

Comments
2 min read
AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security
Cover image for AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security

AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security

1
Comments
4 min read
Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery
Cover image for Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery

Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery

Comments
3 min read
How to Integrate Vulnerability Scanning Into DevSecOps Workflows
Cover image for How to Integrate Vulnerability Scanning Into DevSecOps Workflows

How to Integrate Vulnerability Scanning Into DevSecOps Workflows

2
Comments
7 min read
Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners

Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.