Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Restrict GitHub branches to specific prefixes
Cover image for Restrict GitHub branches to specific prefixes

Restrict GitHub branches to specific prefixes

Comments
1 min read
Streamlining Security Management

Streamlining Security Management

3
Comments
5 min read
DruBOM: An SBOM for Drupal
Cover image for DruBOM: An SBOM for Drupal

DruBOM: An SBOM for Drupal

5
Comments
3 min read
Understanding the Risks of Long-Lived Kubernetes Service Account Tokens
Cover image for Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

7
Comments
7 min read
Deploying Containers with Security in mind (Beginner)
Cover image for Deploying Containers with Security in mind (Beginner)

Deploying Containers with Security in mind (Beginner)

2
Comments
3 min read
Comprehensive re:Cap security practice on AWS
Cover image for Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

9
Comments 2
17 min read
Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow
Cover image for Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow

Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow

23
Comments 5
6 min read
Should Sensitive Systems Be Open Source ?
Cover image for Should Sensitive Systems Be Open Source ?

Should Sensitive Systems Be Open Source ?

12
Comments 4
6 min read
DevSecOps 101: What is DevSecOps?
Cover image for DevSecOps 101: What is DevSecOps?

DevSecOps 101: What is DevSecOps?

1
Comments
5 min read
IAM Identity Center com Terraform

IAM Identity Center com Terraform

4
Comments
4 min read
Azure Network Security Groups
Cover image for Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks
Cover image for The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

Comments
6 min read
Five Ways Your CI/CD Pipeline Can Be Exploited
Cover image for Five Ways Your CI/CD Pipeline Can Be Exploited

Five Ways Your CI/CD Pipeline Can Be Exploited

2
Comments
5 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users
Cover image for Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments 1
2 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk
Cover image for A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.