Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Disable antivirus real-time monitoring with PowerShell

Disable antivirus real-time monitoring with PowerShell

Comments
1 min read
Digital Vaults: Unlocking the Future of Data Archiving with Cutting-Edge Databases

Digital Vaults: Unlocking the Future of Data Archiving with Cutting-Edge Databases

Comments
2 min read
Part 3 of My First .NET Core Web API Project: Documenting the Rookie Mistakes and Wins on the Way to a Job.

Part 3 of My First .NET Core Web API Project: Documenting the Rookie Mistakes and Wins on the Way to a Job.

Comments
3 min read
Why is authN and AuthZ still the hardest part of building solo?

Why is authN and AuthZ still the hardest part of building solo?

Comments
1 min read
Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps
Cover image for Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps

Next.js Middleware: The Zero-Latency Security Gateway for Enterprise Apps

3
Comments
2 min read
Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage
Cover image for Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

Leyzen Vault – Bringing Moving-Target Defense to Open-Source Secure Storage

1
Comments
2 min read
Hello Dev Community
Cover image for Hello Dev Community

Hello Dev Community

Comments
1 min read
🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

Comments
3 min read
🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

Comments
3 min read
Secure your VPC with AWS Network Firewall

Secure your VPC with AWS Network Firewall

1
Comments
3 min read
EnvSecOps: The Obviously Painful Path Forward

EnvSecOps: The Obviously Painful Path Forward

Comments
3 min read
Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction
Cover image for Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

Anatomy of a Flash Loan Attack: Stealing Millions in One Transaction

4
Comments
6 min read
Building Ghostable & Finding Ideas by Listening Well
Cover image for Building Ghostable & Finding Ideas by Listening Well

Building Ghostable & Finding Ideas by Listening Well

4
Comments 2
3 min read
Auth0 for AI Agents is now generally available!
Cover image for Auth0 for AI Agents is now generally available!

Auth0 for AI Agents is now generally available!

81
Comments 8
3 min read
Eppie, a new open-source cross-platform email client, on Snap Store🐧
Cover image for Eppie, a new open-source cross-platform email client, on Snap Store🐧

Eppie, a new open-source cross-platform email client, on Snap Store🐧

2
Comments
2 min read
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db
Cover image for Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db

Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db

3
Comments
2 min read
How to use authentication using Athentication Kit

How to use authentication using Athentication Kit

Comments
3 min read
Staged vs. Non Staged Payloads

Staged vs. Non Staged Payloads

Comments
3 min read
Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

Building Resilient Defenses: A Practical Guide to Modern DDoS Attack Mitigation

2
Comments 1
6 min read
Engineering Trust in 2025: A Developer’s Field Guide to Credible Information

Engineering Trust in 2025: A Developer’s Field Guide to Credible Information

Comments
5 min read
PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord
Cover image for PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

Comments
3 min read
Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis
Cover image for Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis

Building a Sigma Rule Engine in TypeScript: Detection-as-Code for Log Analysis

1
Comments
4 min read
Day 2 — Phishing & Identity Verification (The Typed Letter)
Cover image for Day 2 — Phishing & Identity Verification (The Typed Letter)

Day 2 — Phishing & Identity Verification (The Typed Letter)

6
Comments
2 min read
Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment
Cover image for Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment

Automation of Multi-Cloud & Hybrid Challenge with Multi-Tool – Part 2: Hybrid AWS RDS Deployment

3
Comments
3 min read
Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

Building a Secure Password Generator with Web Crypto API: No Servers, Pure Browser Power

1
Comments
4 min read
loading...