Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

1
Comments
3 min read
What is a Smurf Attack?

What is a Smurf Attack?

Comments
4 min read
Introducing SmartScanner: Your Go-To Security Buddy for Node.js

Introducing SmartScanner: Your Go-To Security Buddy for Node.js

1
Comments
4 min read
Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

Comments
2 min read
Essential Security Best Practices for Ruby on Rails

Essential Security Best Practices for Ruby on Rails

15
Comments 2
10 min read
Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Comments
3 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Looking for potential vulnerabilities in code, part 2: practice

Looking for potential vulnerabilities in code, part 2: practice

Comments 2
14 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

7
Comments
1 min read
How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

Comments
2 min read
Enhancing Web Application Security with AES, RSA, and Hashing Techniques

Enhancing Web Application Security with AES, RSA, and Hashing Techniques

Comments
4 min read
Talos Linux Part 2: Meet Omni – The Managed Kubernetes Platform Powered by Talos

Talos Linux Part 2: Meet Omni – The Managed Kubernetes Platform Powered by Talos

2
Comments
4 min read
Level Up Your AWS Security: A Detailed Prioritized Checklist from the Trenches

Level Up Your AWS Security: A Detailed Prioritized Checklist from the Trenches

1
Comments
4 min read
Introducción a Amazon GuardDuty: Generar hallazgos de prueba

Introducción a Amazon GuardDuty: Generar hallazgos de prueba

5
Comments
3 min read
Building Scalable PHP Applications: Best Practices for Performance and Security

Building Scalable PHP Applications: Best Practices for Performance and Security

4
Comments 2
3 min read
Data Privacy in the API Economy: Balancing Innovation with Security

Data Privacy in the API Economy: Balancing Innovation with Security

16
Comments 1
6 min read
Tech innovator

Tech innovator

Comments
1 min read
Creating a User in Unraid for Secure Access

Creating a User in Unraid for Secure Access

Comments
1 min read
Setting up TLS connection for containerized PostgreSQL database

Setting up TLS connection for containerized PostgreSQL database

4
Comments
4 min read
Authentication and Authorization Best Practices

Authentication and Authorization Best Practices

Comments
3 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Comments
3 min read
Compliance Tools for Cloud Environments

Compliance Tools for Cloud Environments

1
Comments
4 min read
Let's get messy

Let's get messy

Comments
3 min read
Tríade CIA e Sua Importância na Cibersegurança.

Tríade CIA e Sua Importância na Cibersegurança.

Comments
3 min read
loading...