Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Choose the Right Authentication Method for Your Backend
Cover image for How to Choose the Right Authentication Method for Your Backend

How to Choose the Right Authentication Method for Your Backend

4
Comments 1
4 min read
Stuff we shipped in July

Stuff we shipped in July

4
Comments 1
1 min read
Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

5
Comments
4 min read
Embracing CDK: Use Case to Move from CloudFormation YAML to CDK?

Embracing CDK: Use Case to Move from CloudFormation YAML to CDK?

Comments
9 min read
Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)
Cover image for Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

3
Comments 1
3 min read
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
Implementing Robust API Security Measures [Part 2]
Cover image for Implementing Robust API Security Measures [Part 2]

Implementing Robust API Security Measures [Part 2]

Comments
2 min read
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown
Cover image for Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Comments
1 min read
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'
Cover image for Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'

Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'

Comments
1 min read
Securing MCP Servers
Cover image for Securing MCP Servers

Securing MCP Servers

4
Comments
8 min read
How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security
Cover image for How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

How to Move, Scale, and Optimize an Azure Virtual Machine for Performance and Security

6
Comments
3 min read
How to Create a Read-Only User in PostgreSQL (With Access to Statistics)
Cover image for How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

How to Create a Read-Only User in PostgreSQL (With Access to Statistics)

Comments
2 min read
Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)
Cover image for Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)

Cómo crear un usuario de solo lectura en PostgreSQL (con acceso a estadísticas)

Comments
3 min read
CVE-2022-46166 - Template Injection - Remote Code Execution

CVE-2022-46166 - Template Injection - Remote Code Execution

Comments
3 min read
Understand Bots and Protect Your Website from Bot Attacks
Cover image for Understand Bots and Protect Your Website from Bot Attacks

Understand Bots and Protect Your Website from Bot Attacks

Comments
4 min read
WebApp Security Checklist For Business in USA
Cover image for WebApp Security Checklist For Business in USA

WebApp Security Checklist For Business in USA

Comments
3 min read
How to Secure SSH Access with Short-Lived Certificates
Cover image for How to Secure SSH Access with Short-Lived Certificates

How to Secure SSH Access with Short-Lived Certificates

1
Comments
4 min read
Access and Refresh Tokens in Token-Based Authentication
Cover image for Access and Refresh Tokens in Token-Based Authentication

Access and Refresh Tokens in Token-Based Authentication

17
Comments
6 min read
How to Configure SSL Certificates in Nginx for Secure HTTPS Connections
Cover image for How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

How to Configure SSL Certificates in Nginx for Secure HTTPS Connections

1
Comments
2 min read
AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive
Cover image for AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive

AWS Cloud Path Week 13: AWS Networking Workshop Part 3 - Security Controls Deep Dive

Comments
4 min read
☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements
Cover image for ☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

☁️AWS Recap - July 2025: AI Agent, Global Cloud Expansion and Security Advancements

19
Comments 9
2 min read
RBAC Models Explained

RBAC Models Explained

3
Comments 4
5 min read
Your Servers Deserve Better: Meet Minexus, a Smart Admin Agent System in Go

Your Servers Deserve Better: Meet Minexus, a Smart Admin Agent System in Go

Comments
2 min read
OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up
Cover image for OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up

OpenAI Pulls ChatGPT Search‑Index Feature A Critical Follow‑Up

13
Comments
5 min read
loading...