Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Improve Your DevOps Test Automation Strategy
Cover image for How to Improve Your DevOps Test Automation Strategy

How to Improve Your DevOps Test Automation Strategy

36
Comments
7 min read
2 Factor Authentication Using an External Drive
Cover image for 2 Factor Authentication Using an External Drive

2 Factor Authentication Using an External Drive

5
Comments
4 min read
Controlling Access to Your Microservices with Istio Service Mesh

Controlling Access to Your Microservices with Istio Service Mesh

2
Comments
1 min read
Libsodium Quick Reference

Libsodium Quick Reference

10
Comments 1
11 min read
User creation and first access

User creation and first access

1
Comments
1 min read
Detecting, Reporting and Mitigating System Vulnerabilities for Go

Detecting, Reporting and Mitigating System Vulnerabilities for Go

4
Comments
5 min read
All about aria-current attribute

All about aria-current attribute

14
Comments
2 min read
What Not to Log When Remotely Debugging Mobile Apps
Cover image for What Not to Log When Remotely Debugging Mobile Apps

What Not to Log When Remotely Debugging Mobile Apps

7
Comments
7 min read
Baby's First Hash Encryption
Cover image for Baby's First Hash Encryption

Baby's First Hash Encryption

4
Comments
5 min read
10 Rules for Protecting your Computer from Malware

10 Rules for Protecting your Computer from Malware

4
Comments
4 min read
I Clicked On A Facebook Scam To See What Would Happen

I Clicked On A Facebook Scam To See What Would Happen

47
Comments 27
6 min read
Securing Single-page Applications with OpenID Connect

Securing Single-page Applications with OpenID Connect

4
Comments
1 min read
Data security in multi-tenant SaaS applications

Data security in multi-tenant SaaS applications

22
Comments
4 min read
HoneyDocker
Cover image for HoneyDocker

HoneyDocker

5
Comments
10 min read
Implementing Type Classes for Verifying Cryptography

Implementing Type Classes for Verifying Cryptography

1
Comments
2 min read
GitHub security: what does it take to protect your company from credentials leaking on GitHub?
Cover image for GitHub security: what does it take to protect your company from credentials leaking on GitHub?

GitHub security: what does it take to protect your company from credentials leaking on GitHub?

3
Comments
7 min read
Secure Quiz platform

Secure Quiz platform

2
Comments
1 min read
Writing software for a malicious world
Cover image for  Writing software for a malicious world

Writing software for a malicious world

12
Comments
3 min read
Secure way of doing OAuth for SPA & Native Apps
Cover image for Secure way of doing OAuth for SPA & Native Apps

Secure way of doing OAuth for SPA & Native Apps

23
Comments
3 min read
How to handle PII in websites and web apps
Cover image for How to handle PII in websites and web apps

How to handle PII in websites and web apps

6
Comments
7 min read
Vulnerability Management: 5 Best Practices to Protect Your Business
Cover image for Vulnerability Management: 5 Best Practices to Protect Your Business

Vulnerability Management: 5 Best Practices to Protect Your Business

7
Comments
9 min read
Differences Between Static Code Analysis and Dynamic Testing
Cover image for Differences Between Static Code Analysis and Dynamic Testing

Differences Between Static Code Analysis and Dynamic Testing

6
Comments
5 min read
What is SQL injection and how do I avoid it in Go?

What is SQL injection and how do I avoid it in Go?

15
Comments 7
5 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

5
Comments
3 min read
Microsoft is absolutely at fault for WannaCry
Cover image for Microsoft is absolutely at fault for WannaCry

Microsoft is absolutely at fault for WannaCry

13
Comments 32
4 min read
loading...