Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Magento 2 Security Patches Are Not Optional for Enterprise Stores
Cover image for Why Magento 2 Security Patches Are Not Optional for Enterprise Stores

Why Magento 2 Security Patches Are Not Optional for Enterprise Stores

Comments
5 min read
Access Control in Web Apps: Backend + Frontend

Access Control in Web Apps: Backend + Frontend

Comments
5 min read
7 Tips for Securing Nginx with TLS, Firewall Rules, and Fail2Ban

7 Tips for Securing Nginx with TLS, Firewall Rules, and Fail2Ban

1
Comments
3 min read
📰 Major Tech News: Oct 19th, 2025
Cover image for 📰 Major Tech News: Oct 19th, 2025

📰 Major Tech News: Oct 19th, 2025

26
Comments
4 min read
Ethical Data Practices Every Developer Should Care About in 2025
Cover image for Ethical Data Practices Every Developer Should Care About in 2025

Ethical Data Practices Every Developer Should Care About in 2025

2
Comments 1
3 min read
Azure Policy & Governance

Azure Policy & Governance

Comments
5 min read
CMK: The Master Key to Your AWS Encryption Kingdom
Cover image for CMK: The Master Key to Your AWS Encryption Kingdom

CMK: The Master Key to Your AWS Encryption Kingdom

1
Comments
4 min read
Auth0 for AI Agents Challenge: Deadline Extended by 1-Week!

Auth0 for AI Agents Challenge: Deadline Extended by 1-Week!

33
Comments 8
1 min read
SQL Server Ledger Tables: Complete Guide with Banking Example
Cover image for SQL Server Ledger Tables: Complete Guide with Banking Example

SQL Server Ledger Tables: Complete Guide with Banking Example

Comments
3 min read
📰 Major Tech News: Oct 18th, 2025
Cover image for 📰 Major Tech News: Oct 18th, 2025

📰 Major Tech News: Oct 18th, 2025

14
Comments 2
5 min read
NIS2 Compliance 2025: What’s Actually In Force
Cover image for NIS2 Compliance 2025: What’s Actually In Force

NIS2 Compliance 2025: What’s Actually In Force

3
Comments
7 min read
Mastering SSL Pinning in iOS: From Basics to Production

Mastering SSL Pinning in iOS: From Basics to Production

5
Comments 2
5 min read
Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

Who’s Who in Cybersecurity: Understanding the Different Types of Threat Actors

1
Comments
4 min read
Outil de Cybersécurité du Jour - Sep 21, 2025

Outil de Cybersécurité du Jour - Sep 21, 2025

1
Comments
3 min read
Top Dependency Scanners: A Comprehensive Guide
Cover image for Top Dependency Scanners: A Comprehensive Guide

Top Dependency Scanners: A Comprehensive Guide

Comments
6 min read
⚙️ New TEE vulnerabilities what’s up and who’s affected
Cover image for ⚙️ New TEE vulnerabilities what’s up and who’s affected

⚙️ New TEE vulnerabilities what’s up and who’s affected

2
Comments 4
1 min read
30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate
Cover image for 30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

2
Comments
3 min read
Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.
Cover image for Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.

Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.

4
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 16, 2025

Outil de Cybersécurité du Jour - Sep 16, 2025

Comments
3 min read
TemplateScorer

TemplateScorer

Comments
3 min read
When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

2
Comments 3
3 min read
JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

Comments
4 min read
Safely Collect User Feedback with Cloudflare Workers + Slack
Cover image for Safely Collect User Feedback with Cloudflare Workers + Slack

Safely Collect User Feedback with Cloudflare Workers + Slack

4
Comments
4 min read
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3
Cover image for From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

1
Comments
3 min read
Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Comments
4 min read
loading...