Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
All about aria-current attribute

All about aria-current attribute

14
Comments
2 min read
What Not to Log When Remotely Debugging Mobile Apps
Cover image for What Not to Log When Remotely Debugging Mobile Apps

What Not to Log When Remotely Debugging Mobile Apps

7
Comments
7 min read
Baby's First Hash Encryption
Cover image for Baby's First Hash Encryption

Baby's First Hash Encryption

4
Comments
5 min read
10 Rules for Protecting your Computer from Malware

10 Rules for Protecting your Computer from Malware

4
Comments
4 min read
I Clicked On A Facebook Scam To See What Would Happen

I Clicked On A Facebook Scam To See What Would Happen

47
Comments 27
6 min read
Securing Single-page Applications with OpenID Connect

Securing Single-page Applications with OpenID Connect

4
Comments
1 min read
Data security in multi-tenant SaaS applications

Data security in multi-tenant SaaS applications

22
Comments
4 min read
HoneyDocker
Cover image for HoneyDocker

HoneyDocker

5
Comments
10 min read
Implementing Type Classes for Verifying Cryptography

Implementing Type Classes for Verifying Cryptography

1
Comments
2 min read
GitHub security: what does it take to protect your company from credentials leaking on GitHub?
Cover image for GitHub security: what does it take to protect your company from credentials leaking on GitHub?

GitHub security: what does it take to protect your company from credentials leaking on GitHub?

3
Comments
7 min read
Secure Quiz platform

Secure Quiz platform

2
Comments
1 min read
Writing software for a malicious world
Cover image for  Writing software for a malicious world

Writing software for a malicious world

12
Comments
3 min read
Secure way of doing OAuth for SPA & Native Apps
Cover image for Secure way of doing OAuth for SPA & Native Apps

Secure way of doing OAuth for SPA & Native Apps

23
Comments
3 min read
How to handle PII in websites and web apps
Cover image for How to handle PII in websites and web apps

How to handle PII in websites and web apps

6
Comments
7 min read
Vulnerability Management: 5 Best Practices to Protect Your Business
Cover image for Vulnerability Management: 5 Best Practices to Protect Your Business

Vulnerability Management: 5 Best Practices to Protect Your Business

7
Comments
9 min read
Differences Between Static Code Analysis and Dynamic Testing
Cover image for Differences Between Static Code Analysis and Dynamic Testing

Differences Between Static Code Analysis and Dynamic Testing

6
Comments
5 min read
What is SQL injection and how do I avoid it in Go?

What is SQL injection and how do I avoid it in Go?

15
Comments 7
5 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

5
Comments
3 min read
Microsoft is absolutely at fault for WannaCry
Cover image for Microsoft is absolutely at fault for WannaCry

Microsoft is absolutely at fault for WannaCry

13
Comments 32
4 min read
Securing GraphQL API from malicious queries
Cover image for Securing GraphQL API from malicious queries

Securing GraphQL API from malicious queries

16
Comments
6 min read
The Impact of Security Misconfiguration and Its Mitigation
Cover image for The Impact of Security Misconfiguration and Its Mitigation

The Impact of Security Misconfiguration and Its Mitigation

2
Comments
4 min read
5 DevOps Monitoring Strategies for Your Application
Cover image for 5 DevOps Monitoring Strategies for Your Application

5 DevOps Monitoring Strategies for Your Application

39
Comments
7 min read
DockerCon 2017 recap

DockerCon 2017 recap

16
Comments
3 min read
Recipe for Infection: Ransomware
Cover image for Recipe for Infection: Ransomware

Recipe for Infection: Ransomware

12
Comments
3 min read
Predictive vs. Adaptive SDLC: What is the Difference?
Cover image for Predictive vs. Adaptive SDLC: What is the Difference?

Predictive vs. Adaptive SDLC: What is the Difference?

2
Comments
5 min read
loading...