Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Navigating the Maze: A Guide to Essential Information Security Standards

Navigating the Maze: A Guide to Essential Information Security Standards

Comments
2 min read
How I Use AI Agents Without Compromising Code Quality & Security
Cover image for How I Use AI Agents Without Compromising Code Quality & Security

How I Use AI Agents Without Compromising Code Quality & Security

2
Comments
2 min read
Software Testing - Manual Testing ,Levels,Types

Software Testing - Manual Testing ,Levels,Types

Comments
4 min read
Which LLMs Are (and Aren't) Ready for Secure Code?

Which LLMs Are (and Aren't) Ready for Secure Code?

20
Comments
3 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device
Cover image for Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
Securing APIs with Two-Factor Authentication
Cover image for Securing APIs with Two-Factor Authentication

Securing APIs with Two-Factor Authentication

Comments
12 min read
🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.
Cover image for 🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.

🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.

1
Comments
8 min read
Understanding the SLSA framework
Cover image for Understanding the SLSA framework

Understanding the SLSA framework

Comments
11 min read
🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

Comments
1 min read
Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Comments
3 min read
No Dockerfile? No problem! Running Node and Python MCPs with ToolHive
Cover image for No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

4
Comments
2 min read
How to Use .env Securely in DevOps Projects

How to Use .env Securely in DevOps Projects

6
Comments
2 min read
🔒 Bandit: Python Static Application Security Testing Guide

🔒 Bandit: Python Static Application Security Testing Guide

1
Comments 1
3 min read
🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library
Cover image for 🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

Comments
2 min read
How does BCrypt Verification work?

How does BCrypt Verification work?

Comments
4 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)
Cover image for Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

14
Comments 3
3 min read
Best DAM Software for Organizing Media on NAS (2025 Guide)

Best DAM Software for Organizing Media on NAS (2025 Guide)

1
Comments
4 min read
Secrets Management & Zero-Trust Architecture for Web3-Grade Security
Cover image for Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Comments
1 min read
Why can deleted files be recovered?

Why can deleted files be recovered?

Comments
5 min read
Penetration Testing for API Security: Protecting Digital Gateways
Cover image for Penetration Testing for API Security: Protecting Digital Gateways

Penetration Testing for API Security: Protecting Digital Gateways

3
Comments
12 min read
How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

Comments
2 min read
Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

15
Comments
2 min read
2-Factor Authentication OTP: TOTP & HOTP Algorithms
Cover image for 2-Factor Authentication OTP: TOTP & HOTP Algorithms

2-Factor Authentication OTP: TOTP & HOTP Algorithms

Comments
6 min read
MCP Is Rewriting the Rules of API Integration
Cover image for MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

6
Comments
8 min read
loading...