Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
JWT Creation and Integration in InterSystems IRIS

JWT Creation and Integration in InterSystems IRIS

Comments
8 min read
Parallel Query Processing - (System-wide and Query-based)

Parallel Query Processing - (System-wide and Query-based)

Comments
6 min read
ITSM (IT Service Management) – Streamline, Standardize, Succeed

ITSM (IT Service Management) – Streamline, Standardize, Succeed

Comments
1 min read
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Comments
3 min read
[Vulnerability Campaign] Protect TECNO devices

[Vulnerability Campaign] Protect TECNO devices

Comments
1 min read
Implementing Robust AWS Security: IAM Best Practices and Encryption Strategies

Implementing Robust AWS Security: IAM Best Practices and Encryption Strategies

Comments
3 min read
Exploiting Websites

Exploiting Websites

1
Comments
2 min read
The Atlassian OAuth Disaster Nobody’s Talking About

The Atlassian OAuth Disaster Nobody’s Talking About

Comments
1 min read
Rethinking AI in Security

Rethinking AI in Security

Comments
5 min read
AWS Security Specialty

AWS Security Specialty

Comments
1 min read
CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

Comments
2 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
🔐 Permission Testing Toolkit — Build, Validate, and Ship Secure Authorization with Permit.io

🔐 Permission Testing Toolkit — Build, Validate, and Ship Secure Authorization with Permit.io

3
Comments 2
3 min read
Securing APIs Against Unauthorized Access

Securing APIs Against Unauthorized Access

Comments
1 min read
10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

Comments
3 min read
Understanding RSA - The Math behind modern encryption

Understanding RSA - The Math behind modern encryption

Comments
3 min read
Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever

Supply Chain Security in 2025: Why SBOM and SLSA Matter More Than Ever

Comments
1 min read
The Essential Web Security Guide for Developers

The Essential Web Security Guide for Developers

2
Comments
21 min read
4 OSQuery Commands to run on a Mac

4 OSQuery Commands to run on a Mac

Comments
2 min read
Guards vs Interceptors no NestJS: quando usar cada um?

Guards vs Interceptors no NestJS: quando usar cada um?

Comments
3 min read
Endpoint Security: A Low-Cost Data Diode

Endpoint Security: A Low-Cost Data Diode

3
Comments
3 min read
AWS Shared Responsibility Model and Security Principles

AWS Shared Responsibility Model and Security Principles

Comments
3 min read
The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

Comments
2 min read
Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Comments
10 min read
Secure Key-Value Store for Raspberry Pi Pico

Secure Key-Value Store for Raspberry Pi Pico

Comments
4 min read
loading...