Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3
Cover image for Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Comments
17 min read
Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

Implementing Two-Factor Authentication in Next.js 14 with NextAuth.js

6
Comments
7 min read
Hash Passwords in Backend: A Guide for Every Tech Stack
Cover image for Hash Passwords in Backend: A Guide for Every Tech Stack

Hash Passwords in Backend: A Guide for Every Tech Stack

1
Comments
3 min read
Beware of the New Enemy Problem ⚠️

Beware of the New Enemy Problem ⚠️

1
Comments
4 min read
Building a Secure User Activation System in Django
Cover image for Building a Secure User Activation System in Django

Building a Secure User Activation System in Django

3
Comments 1
4 min read
Isolating AI Agents with DevContainer: A secure and scalable approach

Isolating AI Agents with DevContainer: A secure and scalable approach

9
Comments 1
3 min read
A Guide to Role-Based Access Control (RBAC) in Strapi
Cover image for A Guide to Role-Based Access Control (RBAC) in Strapi

A Guide to Role-Based Access Control (RBAC) in Strapi

3
Comments
14 min read
Content Security Policy: Your Website's Unsung Hero

Content Security Policy: Your Website's Unsung Hero

7
Comments
2 min read
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench
Cover image for Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

7
Comments
6 min read
How to Transition from IT Support to Cybersecurity: A Complete Career Guide
Cover image for How to Transition from IT Support to Cybersecurity: A Complete Career Guide

How to Transition from IT Support to Cybersecurity: A Complete Career Guide

27
Comments 6
5 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit
Cover image for Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

1
Comments
3 min read
Security news weekly round-up - 28th February 2025
Cover image for Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

How to Detect Bot Traffic using Next.js Middleware: A Quick Guide

10
Comments
4 min read
Best Practices for Storing and Securing Passwords: A Developer's Guide
Cover image for Best Practices for Storing and Securing Passwords: A Developer's Guide

Best Practices for Storing and Securing Passwords: A Developer's Guide

6
Comments
5 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist
Cover image for GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.