Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Comments
9 min read
How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
What is Port 22? SSH, Security Risks, & Best Practices

What is Port 22? SSH, Security Risks, & Best Practices

Comments
5 min read
Secure Your RESTful API Using Keycloak Role-Based Access Control

Secure Your RESTful API Using Keycloak Role-Based Access Control

3
Comments 1
8 min read
Introducing Zerodayf, A dynamic, AI-driven code analysis vulnerability scanner

Introducing Zerodayf, A dynamic, AI-driven code analysis vulnerability scanner

Comments
1 min read
Wireless Networks and Mobile Communication 📡📲

Wireless Networks and Mobile Communication 📡📲

Comments
3 min read
Cybersecurity Certifications: Your Guide to a Successful Career

Cybersecurity Certifications: Your Guide to a Successful Career

Comments
2 min read
Manual Cognito user registration approvals with Step Functions

Manual Cognito user registration approvals with Step Functions

10
Comments
10 min read
2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

2FA & MFA Are NOT Bulletproof – Here’s How Hackers Get Around Them! 🔓

6
Comments
1 min read
ACID in Databases: A Comprehensive Guide

ACID in Databases: A Comprehensive Guide

Comments
5 min read
Smart Contract Security

Smart Contract Security

Comments
3 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

Comments
1 min read
Gamification in Vaccination Centers – Does it Work?

Gamification in Vaccination Centers – Does it Work?

Comments
1 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
AWS Multi-Account IaC Sandwich: Terragrunt, Terraform, CloudFormation

AWS Multi-Account IaC Sandwich: Terragrunt, Terraform, CloudFormation

3
Comments 2
9 min read
Auditing SQL Server Database User Activity in AWS RDS: A Step-by-Step Guide

Auditing SQL Server Database User Activity in AWS RDS: A Step-by-Step Guide

2
Comments 1
3 min read
Just published my first web service - Automated security scanning for webapps

Just published my first web service - Automated security scanning for webapps

Comments
1 min read
Staking 2.0: How AI Optimizes Yield and Security

Staking 2.0: How AI Optimizes Yield and Security

Comments
1 min read
How to Integrate AI Solutions into Your Enterprise System for Maximum ROI

How to Integrate AI Solutions into Your Enterprise System for Maximum ROI

Comments
4 min read
Shield Your Agents: Integrating LangGraph’s workflows with CodeGate's Security Layer

Shield Your Agents: Integrating LangGraph’s workflows with CodeGate's Security Layer

11
Comments
5 min read
Secure Coding Practices in Python

Secure Coding Practices in Python

Comments
1 min read
How to prevent DNS Spoofing in AWS.

How to prevent DNS Spoofing in AWS.

Comments
6 min read
How to integrate Docker Scout with Azure Container Registry

How to integrate Docker Scout with Azure Container Registry

Comments
4 min read
Hacking My Way Into Cybersecurity — The Beginning of My Journey!

Hacking My Way Into Cybersecurity — The Beginning of My Journey!

1
Comments
2 min read
Effortless Wazuh v4.10.0 upgrade using Docker

Effortless Wazuh v4.10.0 upgrade using Docker

Comments
2 min read
loading...