Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple
Cover image for Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Essential JWT Security (Part 2): Refresh Tokens and Revocation Made Simple

Comments
3 min read
📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage
Cover image for 📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

📰 Major Tech News: November 1st, 2025 — Nvidia's Korean AI Surge, Energy Pressures Mount, and Video AI Takes Center Stage

21
Comments 2
5 min read
Why We Used a Data Gateway to Connect On-Prem SQL with Microsoft Fabric

Why We Used a Data Gateway to Connect On-Prem SQL with Microsoft Fabric

Comments
2 min read
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

1
Comments
10 min read
🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain
Cover image for 🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

4
Comments
3 min read
Mastering Role-Based Access Control in Your Javascript CMS
Cover image for Mastering Role-Based Access Control in Your Javascript CMS

Mastering Role-Based Access Control in Your Javascript CMS

3
Comments
6 min read
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture
Cover image for Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

18
Comments 2
9 min read
Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Comments
3 min read
What if we improve the way developers are given access to databases

What if we improve the way developers are given access to databases

Comments
4 min read
Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Comments
2 min read
HTML Decode vs HTML Encode – Complete Guide
Cover image for HTML Decode vs HTML Encode – Complete Guide

HTML Decode vs HTML Encode – Complete Guide

1
Comments
2 min read
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

8
Comments
5 min read
Setting Up PostgreSQL in Docker on Hetzner with SSL Certificates from Certbot

Setting Up PostgreSQL in Docker on Hetzner with SSL Certificates from Certbot

Comments
7 min read
Cloud, Edge, or Local: Choosing the Right Architecture for Smart Security Cameras

Cloud, Edge, or Local: Choosing the Right Architecture for Smart Security Cameras

Comments
2 min read
Namespaces and Policy: Inside the Micro‑MCP Gateway
Cover image for Namespaces and Policy: Inside the Micro‑MCP Gateway

Namespaces and Policy: Inside the Micro‑MCP Gateway

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.