Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how
Cover image for My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

My SaaS passed CASA Tier 2 Assessment and yours can too. Here is how

2
Comments
2 min read
AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks
Cover image for AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

AI-Generated Spear Phishing: The Evolution of Social Engineering Attacks

3
Comments
3 min read
Formal Verification: Bridging Theory and Practice

Formal Verification: Bridging Theory and Practice

Comments
3 min read
Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection
Cover image for Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection

Ditana GNU/Linux: Unmatched Configuration Flexibility and Generic Hardware Detection

2
Comments 2
6 min read
Don’t Let Your Code Become the Titanic
Cover image for Don’t Let Your Code Become the Titanic

Don’t Let Your Code Become the Titanic

Comments
4 min read
PSA: Add the following to your Vercel project's firewall

PSA: Add the following to your Vercel project's firewall

6
Comments
1 min read
Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments
Cover image for Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments

Amazon GuardDuty S3 Malware Protection at Scale in Multi-Account Environments

3
Comments
5 min read
OAuth2 Authorization Code Grant Type: A Deep Dive
Cover image for OAuth2 Authorization Code Grant Type: A Deep Dive

OAuth2 Authorization Code Grant Type: A Deep Dive

Comments
3 min read
Non-functional Application Requirements: Security
Cover image for Non-functional Application Requirements: Security

Non-functional Application Requirements: Security

17
Comments 2
9 min read
10 Ways To Secure Docker Images: Best Strategies
Cover image for 10 Ways To Secure Docker Images: Best Strategies

10 Ways To Secure Docker Images: Best Strategies

7
Comments
4 min read
These are the Ghost Engineers that you want
Cover image for These are the Ghost Engineers that you want

These are the Ghost Engineers that you want

1
Comments
2 min read
Wait, are we just handing over system access to the AI agents?
Cover image for Wait, are we just handing over system access to the AI agents?

Wait, are we just handing over system access to the AI agents?

28
Comments 5
4 min read
ShadowStrike: A Modern DDoS Testing Tool for Website Security
Cover image for ShadowStrike: A Modern DDoS Testing Tool for Website Security

ShadowStrike: A Modern DDoS Testing Tool for Website Security

6
Comments
2 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

Comments 1
1 min read
OverFlow and UnderFlow causes in Solidity

OverFlow and UnderFlow causes in Solidity

2
Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.