Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
NixOS. Managing secrets with sops-nix

NixOS. Managing secrets with sops-nix

Comments
3 min read
AWS CloudTrail Logs : Boost Your Security Now
Cover image for AWS CloudTrail Logs : Boost Your Security Now

AWS CloudTrail Logs : Boost Your Security Now

6
Comments
3 min read
JWT Authentication & Authorization in ASP.NET
Cover image for JWT Authentication & Authorization in ASP.NET

JWT Authentication & Authorization in ASP.NET

2
Comments 1
4 min read
Deploying a Cloudfront Lambda Image Optimization stack with Terraform Part 1 - Cloudfront

Deploying a Cloudfront Lambda Image Optimization stack with Terraform Part 1 - Cloudfront

2
Comments
4 min read
How RBAC Improves API Permission Management
Cover image for How RBAC Improves API Permission Management

How RBAC Improves API Permission Management

17
Comments
12 min read
Top 🔝 Database Change Management 🗃️🔧 Tools in 2025
Cover image for Top 🔝 Database Change Management 🗃️🔧 Tools in 2025

Top 🔝 Database Change Management 🗃️🔧 Tools in 2025

5
Comments
5 min read
How to Use Nuxt 3 Middleware for Authentication and Permissions
Cover image for How to Use Nuxt 3 Middleware for Authentication and Permissions

How to Use Nuxt 3 Middleware for Authentication and Permissions

20
Comments 4
2 min read
Test API for CORS Enablement & Find Issues
Cover image for Test API for CORS Enablement & Find Issues

Test API for CORS Enablement & Find Issues

1
Comments
4 min read
8 Essential API Security Best Practices
Cover image for 8 Essential API Security Best Practices

8 Essential API Security Best Practices

Comments
16 min read
The Cybersecurity Risks of AI-Generated Code: What You Need to Know
Cover image for The Cybersecurity Risks of AI-Generated Code: What You Need to Know

The Cybersecurity Risks of AI-Generated Code: What You Need to Know

7
Comments 1
3 min read
Secure Terraform AWSCC provider resources with Guard Hooks

Secure Terraform AWSCC provider resources with Guard Hooks

5
Comments
5 min read
Implementing TOTP-Based Two-Factor Authentication in .NET Web API

Implementing TOTP-Based Two-Factor Authentication in .NET Web API

2
Comments
3 min read
Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Comments
6 min read
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

3
Comments
2 min read
Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript
Cover image for Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

26
Comments 13
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.