Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Securing Software Development with Secrets Vaults: A Comprehensive Guide
Cover image for Securing Software Development with Secrets Vaults: A Comprehensive Guide

Securing Software Development with Secrets Vaults: A Comprehensive Guide

Comments
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation
Cover image for Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
Understanding CSRF Attacks: Safeguarding Your Web Applications
Cover image for Understanding CSRF Attacks: Safeguarding Your Web Applications

Understanding CSRF Attacks: Safeguarding Your Web Applications

1
Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type
Cover image for OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide
Cover image for Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Comments
2 min read
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration
Cover image for RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

Comments
3 min read
Access Token or ID Token? Which to Use and Why?
Cover image for Access Token or ID Token? Which to Use and Why?

Access Token or ID Token? Which to Use and Why?

Comments
3 min read
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity
Cover image for Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Comments
3 min read
OAuth2: Understanding the Authorization Code Grant Type
Cover image for OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security
Cover image for Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
JSON Web Tokens (JWTs): A Comprehensive Guide
Cover image for JSON Web Tokens (JWTs): A Comprehensive Guide

JSON Web Tokens (JWTs): A Comprehensive Guide

Comments
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization
Cover image for OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
Understanding the Differences Between Authentication and Authorization
Cover image for Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
What does CORS really do? 🤔

What does CORS really do? 🤔

1
Comments
3 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments 1
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.