Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Q Vault: An open source secret manager
Cover image for Q Vault: An open source secret manager

Q Vault: An open source secret manager

7
Comments 27
1 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Explain Blockchain Like I'm Five

Explain Blockchain Like I'm Five

16
Comments 2
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Sneaky Fingerprint and IP Tracker with React
Cover image for Sneaky Fingerprint and IP Tracker with React

Sneaky Fingerprint and IP Tracker with React

53
Comments 1
4 min read
Possibly Odd Approach for Quick Authentication - User Registry API and Passport

Possibly Odd Approach for Quick Authentication - User Registry API and Passport

31
Comments
6 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
Introduction to computer forensics

Introduction to computer forensics

123
Comments 11
5 min read
Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?
Cover image for Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

17
Comments
2 min read
Explain User Token Authentication Like I'm Five

Explain User Token Authentication Like I'm Five

12
Comments 3
1 min read
Let's Encrypt: Wildcard Certificate With Certbot
Cover image for Let's Encrypt: Wildcard Certificate With Certbot

Let's Encrypt: Wildcard Certificate With Certbot

139
Comments 27
3 min read
How to Create Role based Authorization Middleware with Casbin and Nest.js

How to Create Role based Authorization Middleware with Casbin and Nest.js

45
Comments
2 min read
Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

35
Comments 1
4 min read
What the heck is OCSP?
Cover image for What the heck is OCSP?

What the heck is OCSP?

9
Comments
6 min read
Adding permissions without permission
Cover image for Adding permissions without permission

Adding permissions without permission

10
Comments 4
1 min read
Threat Modelling Serverless

Threat Modelling Serverless

40
Comments 3
5 min read
Developers need to stop fearing the InfoSec Mafia
Cover image for Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
Hello, Worm!: Mapping SSH probes with a bash script

Hello, Worm!: Mapping SSH probes with a bash script

49
Comments 8
2 min read
Block malicious login attempts, but preventing account lock-outs.

Block malicious login attempts, but preventing account lock-outs.

19
Comments 12
1 min read
Where do you keep credentials for your Lambda functions?

Where do you keep credentials for your Lambda functions?

88
Comments 45
5 min read
Sankaku Complex XSS

Sankaku Complex XSS

6
Comments
2 min read
Tech writing goals for May 2019

Tech writing goals for May 2019

6
Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

11
Comments 1
1 min read
Azure Sentinel: Taking Security To The Next Level

Azure Sentinel: Taking Security To The Next Level

6
Comments
5 min read
Be educated about today's security.

Be educated about today's security.

47
Comments 3
7 min read
loading...