Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS Security Group Rules
Cover image for AWS Security Group Rules

AWS Security Group Rules

9
Comments
2 min read
Introduction to JWT and OAuth 2.0
Cover image for Introduction to JWT and OAuth 2.0

Introduction to JWT and OAuth 2.0

3
Comments
4 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods
Cover image for Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

1
Comments
6 min read
Securing Microservices with Spring Security: Implementing JWT
Cover image for Securing Microservices with Spring Security: Implementing JWT

Securing Microservices with Spring Security: Implementing JWT

43
Comments 1
14 min read
Ethical Hacking : Users password cracking

Ethical Hacking : Users password cracking

5
Comments
17 min read
Security news weekly round-up - 23rd August 2024
Cover image for Security news weekly round-up - 23rd August 2024

Security news weekly round-up - 23rd August 2024

2
Comments
4 min read
A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

4
Comments
7 min read
Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase
Cover image for Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

55
Comments
3 min read
Implementing Access Requests and Approvals in your App
Cover image for Implementing Access Requests and Approvals in your App

Implementing Access Requests and Approvals in your App

19
Comments
4 min read
How do I keep my digital life safe? (And you should too)
Cover image for How do I keep my digital life safe? (And you should too)

How do I keep my digital life safe? (And you should too)

3
Comments 5
5 min read
How SSL Certificates Work?
Cover image for How SSL Certificates Work?

How SSL Certificates Work?

Comments
2 min read
Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects
Cover image for Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

7
Comments
4 min read
How to Explore an Exposed .git
Cover image for How to Explore an Exposed .git

How to Explore an Exposed .git

7
Comments 1
4 min read
Sign in with Apple for Node.js
Cover image for Sign in with Apple for Node.js

Sign in with Apple for Node.js

Comments
7 min read
PHP Tips | How to assymetric/symmetric encryption đź”’
Cover image for PHP Tips | How to assymetric/symmetric encryption đź”’

PHP Tips | How to assymetric/symmetric encryption đź”’

10
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.