Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hash Passwords in Backend: A Guide for Every Tech Stack

Hash Passwords in Backend: A Guide for Every Tech Stack

1
Comments
3 min read
DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

Comments
6 min read
Building a Secure User Activation System in Django

Building a Secure User Activation System in Django

3
Comments 1
4 min read
S3cmd: CLI for Object Storage

S3cmd: CLI for Object Storage

6
Comments
3 min read
Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Computer Viruses in Practice: Self-Replication

Computer Viruses in Practice: Self-Replication

Comments
6 min read
System Security Concepts

System Security Concepts

1
Comments 2
4 min read
A Guide to Role-Based Access Control (RBAC) in Strapi

A Guide to Role-Based Access Control (RBAC) in Strapi

3
Comments
14 min read
Content Security Policy: Your Website's Unsung Hero

Content Security Policy: Your Website's Unsung Hero

7
Comments
2 min read
Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Comments
3 min read
API Webhook Security

API Webhook Security

Comments
2 min read
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

4
Comments
6 min read
I built this free tool so IT teams can customize and streamline their employee offboarding

I built this free tool so IT teams can customize and streamline their employee offboarding

Comments
1 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
How to Transition from IT Support to Cybersecurity: A Complete Career Guide

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

26
Comments 6
5 min read
Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

1
Comments
3 min read
Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

9
Comments
4 min read
Best Practices for Storing and Securing Passwords: A Developer's Guide

Best Practices for Storing and Securing Passwords: A Developer's Guide

6
Comments
5 min read
⚡ Secure your containers faster—without disrupting your workflow

⚡ Secure your containers faster—without disrupting your workflow

1
Comments
3 min read
Does Patching Containers Feel Like Whack-a-Mole?

Does Patching Containers Feel Like Whack-a-Mole?

1
Comments
2 min read
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

1
Comments
3 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
BL-SOC01 - Jump Into SOC

BL-SOC01 - Jump Into SOC

2
Comments
5 min read
loading...