Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Webassembly is good but doesn't the thought scare you that sites will now be able to run full binary programs on your devices?

Webassembly is good but doesn't the thought scare you that sites will now be able to run full binary programs on your devices?

2
Comments 5
1 min read
How to secure JWT token in React?

How to secure JWT token in React?

21
Comments 6
1 min read
Hackitect series vol.2 - Open source cybersecurity zoo
Cover image for Hackitect series vol.2 - Open source cybersecurity zoo

Hackitect series vol.2 - Open source cybersecurity zoo

12
Comments
5 min read
Package signing in PIP - It works, in a roundabout sort of way

Package signing in PIP - It works, in a roundabout sort of way

3
Comments 3
3 min read
Presentation Tips for Technical Talks

Presentation Tips for Technical Talks

295
Comments 11
5 min read
Preventing malicious authentication attempts while avoiding CAPTCHAs.

Preventing malicious authentication attempts while avoiding CAPTCHAs.

11
Comments 8
5 min read
Return Oriented Programming on ARM (32-bit)

Return Oriented Programming on ARM (32-bit)

31
Comments
5 min read
How to do Security Updates only with Yum in CentOS

How to do Security Updates only with Yum in CentOS

10
Comments 1
1 min read
Pushing Left, Like a Boss — Part 5.3 — Browser and Client-Side Hardening

Pushing Left, Like a Boss — Part 5.3 — Browser and Client-Side Hardening

36
Comments
2 min read
Deconstructing OnlyKey Agent

Deconstructing OnlyKey Agent

12
Comments 3
1 min read
PWGen - Create strong passwords easy to remember but hard to break

PWGen - Create strong passwords easy to remember but hard to break

7
Comments
2 min read
A fun little video about Security concepts for beginners

A fun little video about Security concepts for beginners

14
Comments
2 min read
Get serious about Data Governance now, or it will cost ALL of us in the future.
Cover image for Get serious about Data Governance now, or it will cost ALL of us in the future.

Get serious about Data Governance now, or it will cost ALL of us in the future.

14
Comments
5 min read
Simple Authentication with Spring Security
Cover image for Simple Authentication with Spring Security

Simple Authentication with Spring Security

13
Comments 1
12 min read
AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

7
Comments
5 min read
6 Ways We Get Things Done with Python
Cover image for 6 Ways We Get Things Done with Python

6 Ways We Get Things Done with Python

11
Comments
3 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Content-Security-Policy in ASP.NET MVC

Content-Security-Policy in ASP.NET MVC

7
Comments
3 min read
Privacy and Security Series, Part II: Multi-factor Authentication

Privacy and Security Series, Part II: Multi-factor Authentication

6
Comments
9 min read
Exploiting Common Serverless Security Flaws in AWS

Exploiting Common Serverless Security Flaws in AWS

7
Comments 2
11 min read
OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

10
Comments 1
5 min read
Security in CI/CD

Security in CI/CD

8
Comments
1 min read
The Difference Between Malware, Viruses and Ransomware Explained
Cover image for The Difference Between Malware, Viruses and Ransomware Explained

The Difference Between Malware, Viruses and Ransomware Explained

18
Comments
2 min read
SSL Certificates in Development

SSL Certificates in Development

6
Comments
3 min read
Improving security in ASP.NET MVC using custom headers

Improving security in ASP.NET MVC using custom headers

30
Comments 6
4 min read
loading...