Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why we built Resourcely
Cover image for Why we built Resourcely

Why we built Resourcely

2
Comments
6 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)
Cover image for Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

5
Comments
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)
Cover image for Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

4
Comments
3 min read
Configuring Routes for a Web Application using Azure Firewall (Part 4)
Cover image for Configuring Routes for a Web Application using Azure Firewall (Part 4)

Configuring Routes for a Web Application using Azure Firewall (Part 4)

Comments
2 min read
SCA vs SAST - Security Tools Comparison 🛡️
Cover image for SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Simple OAuth 2.0 Framework for Authentication (Freeware)

Simple OAuth 2.0 Framework for Authentication (Freeware)

Comments
1 min read
Issue 53 of AWS Cloud Security Weekly
Cover image for Issue 53 of AWS Cloud Security Weekly

Issue 53 of AWS Cloud Security Weekly

4
Comments
1 min read
Security Meetup
Cover image for Security Meetup

Security Meetup

Comments
1 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1
Cover image for Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

6
Comments
2 min read
Deep Dive into Elastic Cloud Enterprise (ECE)
Cover image for Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

5
Comments
8 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
1 min read
Exporting private keys in plang programming language
Cover image for Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
3 min read
Top 10 Types of Cyber attacks
Cover image for Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.
Cover image for Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

25
Comments 1
6 min read
Up(sun) and running with Rust: The game-changer in systems programming
Cover image for Up(sun) and running with Rust: The game-changer in systems programming

Up(sun) and running with Rust: The game-changer in systems programming

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.