Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Block IPs on all ports with fail2ban on a docker host
Cover image for Block IPs on all ports with fail2ban on a docker host

Block IPs on all ports with fail2ban on a docker host

7
Comments
1 min read
Introducing Semgrep and r2c

Introducing Semgrep and r2c

2
Comments
4 min read
DevSecOps with Azure DevOps
Cover image for DevSecOps with Azure DevOps

DevSecOps with Azure DevOps

32
Comments
13 min read
JHipster security scanning
Cover image for JHipster security scanning

JHipster security scanning

3
Comments
1 min read
SaaS Security Checklist: Best Practices for Protecting SaaS Apps
Cover image for SaaS Security Checklist: Best Practices for Protecting SaaS Apps

SaaS Security Checklist: Best Practices for Protecting SaaS Apps

31
Comments 2
4 min read
How to use cookies to store secrets in Postman
Cover image for How to use cookies to store secrets in Postman

How to use cookies to store secrets in Postman

8
Comments
3 min read
Integrate Azure AD with Firebase and call MS Graph in a Node.js app

Integrate Azure AD with Firebase and call MS Graph in a Node.js app

14
Comments 8
6 min read
Why I wrote a Serverless Security book
Cover image for Why I wrote a Serverless Security book

Why I wrote a Serverless Security book

3
Comments 2
5 min read
Your javascript can reveal your secrets

Your javascript can reveal your secrets

22
Comments
3 min read
The power of http headers and 4 examples you did not know before
Cover image for The power of http headers and 4 examples you did not know before

The power of http headers and 4 examples you did not know before

111
Comments 1
6 min read
How an SRE became an Application Security Engineer (and you can too)
Cover image for How an SRE became an Application Security Engineer (and you can too)

How an SRE became an Application Security Engineer (and you can too)

6
Comments
8 min read
Skip macOS Catalina security check

Skip macOS Catalina security check

8
Comments
2 min read
Uncovering critical data access using AppMaps
Cover image for Uncovering critical data access using AppMaps

Uncovering critical data access using AppMaps

16
Comments
2 min read
Tenha privacidade total com sua própria VPN hospedada na cloud
Cover image for Tenha privacidade total com sua própria VPN hospedada na cloud

Tenha privacidade total com sua própria VPN hospedada na cloud

14
Comments
16 min read
What are the BENEFITS of DevOps?
Cover image for What are the BENEFITS of DevOps?

What are the BENEFITS of DevOps?

18
Comments 1
5 min read
API Security Best Practices
Cover image for API Security Best Practices

API Security Best Practices

1325
Comments 8
5 min read
Using fine grained access control for search
Cover image for Using fine grained access control for search

Using fine grained access control for search

6
Comments
6 min read
Can a Windows wallpaper really hijack your Microsoft account password?
Cover image for Can a Windows wallpaper really hijack your Microsoft account password?

Can a Windows wallpaper really hijack your Microsoft account password?

5
Comments
4 min read
Express limit rate API request
Cover image for Express limit rate API request

Express limit rate API request

2
Comments
1 min read
Where do you back-up your posts?
Cover image for Where do you back-up your posts?

Where do you back-up your posts?

29
Comments 16
1 min read
President Trump’s Twitter accessed by security expert who guessed password "maga2020!"
Cover image for President Trump’s Twitter accessed by security expert who guessed password "maga2020!"

President Trump’s Twitter accessed by security expert who guessed password "maga2020!"

32
Comments 15
1 min read
Secure Configuration of Web Application Firewalls

Secure Configuration of Web Application Firewalls

18
Comments
2 min read
RSA & How to Create encryption key?
Cover image for RSA & How to Create encryption key?

RSA & How to Create encryption key?

4
Comments
2 min read
Diffie–Hellman key exchange
Cover image for Diffie–Hellman key exchange

Diffie–Hellman key exchange

4
Comments
3 min read
Can Security Teams Benefit from SRE? You bet!
Cover image for Can Security Teams Benefit from SRE? You bet!

Can Security Teams Benefit from SRE? You bet!

3
Comments
6 min read
loading...