Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure MCP Server with NGINX + Supergateway + Render

Secure MCP Server with NGINX + Supergateway + Render

Comments 1
4 min read
Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Introduction to Burp Suite: Basic Usage of Web Application Vulnerability Assessment Tool

Comments
4 min read
The Future of Cybersecurity Jobs: What’s Thriving, Evolving, and Disappearing by 2030

The Future of Cybersecurity Jobs: What’s Thriving, Evolving, and Disappearing by 2030

Comments 2
4 min read
How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
VPC Traffic Flow and Security

VPC Traffic Flow and Security

Comments
7 min read
Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Cracking the Code: My Cybersecurity Journey Through TryHackMe and OverTheWire

Comments
2 min read
What’s Happening Inside Your Linux Kernel?

What’s Happening Inside Your Linux Kernel?

6
Comments
4 min read
Secure CI/CD 2025: How I Harden GitLab at Scale

Secure CI/CD 2025: How I Harden GitLab at Scale

Comments
1 min read
Specter-AAL

Specter-AAL

5
Comments
2 min read
Real-Time API Token Leak Detection & Response with Python

Real-Time API Token Leak Detection & Response with Python

Comments
1 min read
Try the new Secure Session Vault

Try the new Secure Session Vault

Comments
2 min read
Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Why Your App Breaks and Hackers Laugh: A Real Talk on HTTP

Comments
3 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
WordPress Roles & Capabilities: A Practical Guide

WordPress Roles & Capabilities: A Practical Guide

Comments
1 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
Secure Your Node.js API Like a Bank Vault

Secure Your Node.js API Like a Bank Vault

Comments
2 min read
Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Comments
1 min read
5-Layer Windows Registry Anomaly Detection Using Python

5-Layer Windows Registry Anomaly Detection Using Python

Comments
1 min read
Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Comments
2 min read
Why Developers Seek an Auth0 Alternative

Why Developers Seek an Auth0 Alternative

Comments
2 min read
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

Comments
10 min read
Face Recognition for Crypto: Enhancing Security and Trust

Face Recognition for Crypto: Enhancing Security and Trust

Comments
1 min read
Docker Hardened Images: Secure, Minimal, and Ready for Production

Docker Hardened Images: Secure, Minimal, and Ready for Production

1
Comments
1 min read
Java Microservices on Kubernetes: A Step-by-Step Guide

Java Microservices on Kubernetes: A Step-by-Step Guide

Comments
1 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js

Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js

1
Comments
3 min read
loading...