Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

1
Comments
3 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
BL-SOC01 - Jump Into SOC

BL-SOC01 - Jump Into SOC

2
Comments
5 min read
Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments 1
7 min read
ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

Comments
2 min read
Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Comments
2 min read
Why your environment variables aren’t safe

Why your environment variables aren’t safe

7
Comments 1
9 min read
The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

Comments
4 min read
Meet BeanoGuard – Your New Best Friend for Secure Passwords

Meet BeanoGuard – Your New Best Friend for Secure Passwords

2
Comments
2 min read
Understanding the STRIDE Function in Cybersecurity

Understanding the STRIDE Function in Cybersecurity

Comments
3 min read
Using YubiKeys for passwordless authentication in Cognito user pools

Using YubiKeys for passwordless authentication in Cognito user pools

6
Comments
6 min read
AWS security and compliance

AWS security and compliance

Comments 1
1 min read
Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

Full Stack Security Essentials: Preventing CSRF, Clickjacking, and Ensuring Content Integrity in JavaScript

25
Comments 13
4 min read
Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
Google OIDC and Prompt Login

Google OIDC and Prompt Login

2
Comments
1 min read
RS Authenticator – Your Ultimate 2FA Security Solution!

RS Authenticator – Your Ultimate 2FA Security Solution!

Comments
1 min read
🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

1
Comments
3 min read
Introducing SmartScanner: Your Go-To Security Buddy for Node.js

Introducing SmartScanner: Your Go-To Security Buddy for Node.js

1
Comments
4 min read
Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
What is a Smurf Attack?

What is a Smurf Attack?

1
Comments
4 min read
How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

Comments
2 min read
Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Comments
3 min read
Essential Security Best Practices for Ruby on Rails

Essential Security Best Practices for Ruby on Rails

15
Comments 2
10 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Looking for potential vulnerabilities in code, part 2: practice

Looking for potential vulnerabilities in code, part 2: practice

Comments 2
14 min read
loading...