Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
4 min read
How to Run Models Locally: A Step-by-Step Guide for Non-Techies

How to Run Models Locally: A Step-by-Step Guide for Non-Techies

1
Comments
3 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
Avoiding Production Disasters with npm ci: The Key to Stable Deployments

Avoiding Production Disasters with npm ci: The Key to Stable Deployments

6
Comments 1
3 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Why we as Europeans need to ditch US tech and how

Why we as Europeans need to ditch US tech and how

2
Comments 4
4 min read
Code Reviews with AI: a Developer Guide

Code Reviews with AI: a Developer Guide

5
Comments 3
10 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 1
2 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
Intro to Service Workers: Best Practices & Threat Mitigation

Intro to Service Workers: Best Practices & Threat Mitigation

2
Comments 1
4 min read
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
Why is GRC Important in 2025?

Why is GRC Important in 2025?

Comments
3 min read
Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

1
Comments
2 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

6
Comments
4 min read
Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
loading...