Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HoneyDocker
Cover image for HoneyDocker

HoneyDocker

5
Comments
10 min read
Implementing Type Classes for Verifying Cryptography

Implementing Type Classes for Verifying Cryptography

1
Comments
2 min read
GitHub security: what does it take to protect your company from credentials leaking on GitHub?
Cover image for GitHub security: what does it take to protect your company from credentials leaking on GitHub?

GitHub security: what does it take to protect your company from credentials leaking on GitHub?

3
Comments
7 min read
Secure Quiz platform

Secure Quiz platform

2
Comments
1 min read
Writing software for a malicious world
Cover image for  Writing software for a malicious world

Writing software for a malicious world

12
Comments
3 min read
Secure way of doing OAuth for SPA & Native Apps
Cover image for Secure way of doing OAuth for SPA & Native Apps

Secure way of doing OAuth for SPA & Native Apps

23
Comments
3 min read
How to handle PII in websites and web apps
Cover image for How to handle PII in websites and web apps

How to handle PII in websites and web apps

6
Comments
7 min read
Vulnerability Management: 5 Best Practices to Protect Your Business
Cover image for Vulnerability Management: 5 Best Practices to Protect Your Business

Vulnerability Management: 5 Best Practices to Protect Your Business

7
Comments
9 min read
Differences Between Static Code Analysis and Dynamic Testing
Cover image for Differences Between Static Code Analysis and Dynamic Testing

Differences Between Static Code Analysis and Dynamic Testing

6
Comments
5 min read
What is SQL injection and how do I avoid it in Go?

What is SQL injection and how do I avoid it in Go?

15
Comments 7
5 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

5
Comments
3 min read
Microsoft is absolutely at fault for WannaCry
Cover image for Microsoft is absolutely at fault for WannaCry

Microsoft is absolutely at fault for WannaCry

13
Comments 32
4 min read
Securing GraphQL API from malicious queries
Cover image for Securing GraphQL API from malicious queries

Securing GraphQL API from malicious queries

16
Comments
6 min read
The Impact of Security Misconfiguration and Its Mitigation
Cover image for The Impact of Security Misconfiguration and Its Mitigation

The Impact of Security Misconfiguration and Its Mitigation

2
Comments
4 min read
5 DevOps Monitoring Strategies for Your Application
Cover image for 5 DevOps Monitoring Strategies for Your Application

5 DevOps Monitoring Strategies for Your Application

39
Comments
7 min read
DockerCon 2017 recap

DockerCon 2017 recap

16
Comments
3 min read
Recipe for Infection: Ransomware
Cover image for Recipe for Infection: Ransomware

Recipe for Infection: Ransomware

12
Comments
3 min read
Predictive vs. Adaptive SDLC: What is the Difference?
Cover image for Predictive vs. Adaptive SDLC: What is the Difference?

Predictive vs. Adaptive SDLC: What is the Difference?

2
Comments
5 min read
A Strategy for Passing AWS Certifications

A Strategy for Passing AWS Certifications

6
Comments 1
4 min read
Evil Session Tokens

Evil Session Tokens

13
Comments 12
2 min read
Are Your Children Safe?

Are Your Children Safe?

14
Comments
1 min read
How Companies Prey On Your Ignorance of Tech and Your Fear of Hackers

How Companies Prey On Your Ignorance of Tech and Your Fear of Hackers

25
Comments 10
3 min read
My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

57
Comments 14
3 min read
Clarifying Authentication and Authorization with Lupe Fiasco

Clarifying Authentication and Authorization with Lupe Fiasco

3
Comments 1
2 min read
How my car insurance exposed my position

How my car insurance exposed my position

4
Comments 8
7 min read
loading...