Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your Web Application with AWS WAF and AWS Shield
Cover image for Securing Your Web Application with AWS WAF and AWS Shield

Securing Your Web Application with AWS WAF and AWS Shield

1
Comments
5 min read
Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

6
Comments
6 min read
Keeping Your Microservices Safe: Best Practices and Patterns
Cover image for Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments 2
3 min read
How To Implement AWS SSB Controls in Terraform - Part 4
Cover image for How To Implement AWS SSB Controls in Terraform - Part 4

How To Implement AWS SSB Controls in Terraform - Part 4

2
Comments
11 min read
Identity and Access Management (IAM)

Identity and Access Management (IAM)

Comments
2 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

1
Comments
1 min read
The ROI of paying open source maintainers (in light of the xz utils backdoor)

The ROI of paying open source maintainers (in light of the xz utils backdoor)

1
Comments 1
7 min read
Azure Managed Identities: No more secrets

Azure Managed Identities: No more secrets

1
Comments
4 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration
Cover image for Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Enhancing API Security: Best Practices for Developers
Cover image for Enhancing API Security: Best Practices for Developers

Enhancing API Security: Best Practices for Developers

4
Comments 2
2 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!
Cover image for TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
Gerenciando informaçÔes e eventos de segurança - SIEM

Gerenciando informaçÔes e eventos de segurança - SIEM

3
Comments
3 min read
Analyzing Software Supply Chain Security with Graph Analytics
Cover image for Analyzing Software Supply Chain Security with Graph Analytics

Analyzing Software Supply Chain Security with Graph Analytics

Comments
1 min read
"Keep everything online"
Cover image for "Keep everything online"

"Keep everything online"

Comments
3 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

2
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.