Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Kubernetes External Access with ExternalDNS and cert-manager

Secure Kubernetes External Access with ExternalDNS and cert-manager

Comments
1 min read
Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks
Cover image for Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks

Battling the Silent Threat: A Practical Guide to Preventing CSRF Attacks

1
Comments 1
4 min read
Cybersecurity Learning Journey: Reposting with Clarity
Cover image for Cybersecurity Learning Journey: Reposting with Clarity

Cybersecurity Learning Journey: Reposting with Clarity

1
Comments 1
2 min read
Cybr - Introduction to AWS Security

Cybr - Introduction to AWS Security

Comments
1 min read
Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe
Cover image for Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Comments
5 min read
How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design
Cover image for How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

1
Comments
4 min read
Think Alexa Isn’t Listening? Think Again
Cover image for Think Alexa Isn’t Listening? Think Again

Think Alexa Isn’t Listening? Think Again

Comments
2 min read
Is Going Offline the Only Way to Stay Safe?
Cover image for Is Going Offline the Only Way to Stay Safe?

Is Going Offline the Only Way to Stay Safe?

Comments
1 min read
Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)
Cover image for Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

1
Comments
4 min read
Unmasking the Man in the Middle – The Secrets of Secure Connections
Cover image for Unmasking the Man in the Middle – The Secrets of Secure Connections

Unmasking the Man in the Middle – The Secrets of Secure Connections

Comments
6 min read
SSIS Tip: How to Check the Project or Package Protection Level
Cover image for SSIS Tip: How to Check the Project or Package Protection Level

SSIS Tip: How to Check the Project or Package Protection Level

Comments
1 min read
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

1
Comments
3 min read
Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching
Cover image for Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Comments
8 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Threat Intelligence: Security Flaw Exploitation

Threat Intelligence: Security Flaw Exploitation

1
Comments
1 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

2
Comments
3 min read
Security news weekly round-up - 4th July 2025
Cover image for Security news weekly round-up - 4th July 2025

Security news weekly round-up - 4th July 2025

1
Comments
5 min read
OWASP Cornucopia Companion Edition
Cover image for OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
How to Deploy SafeLine WAF on a cPanel VPS

How to Deploy SafeLine WAF on a cPanel VPS

5
Comments
2 min read
A Hybrid Login-Linked Registration Method as a Security Measure Against Game Piracy

A Hybrid Login-Linked Registration Method as a Security Measure Against Game Piracy

5
Comments
5 min read
The Complete Guide to HTTP Cookies: What Every Web Developer Must Know
Cover image for The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

1
Comments 2
15 min read
5 Ways Your Translation Processes Pose a Security Risk

5 Ways Your Translation Processes Pose a Security Risk

7
Comments
3 min read
loading...