Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
When I Realized My App Needed Content Moderation (and What I Learned)

When I Realized My App Needed Content Moderation (and What I Learned)

Comments
2 min read
Decoding Network Security Monitoring: A Pragmatic Comparison of Zeek, pfSense, and Security Onion for DevOps

Decoding Network Security Monitoring: A Pragmatic Comparison of Zeek, pfSense, and Security Onion for DevOps

Comments
8 min read
7 Tips for Securing Nginx with TLS and Firewall on Production Servers

7 Tips for Securing Nginx with TLS and Firewall on Production Servers

Comments
3 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)
Cover image for Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
7 Tips for Securing Nginx with TLS and Firewall Rules Today

7 Tips for Securing Nginx with TLS and Firewall Rules Today

Comments
3 min read
How to use crypto library in Nodejs

How to use crypto library in Nodejs

Comments
3 min read
Mastering API Testing with Quarkus: From RestAssured to Pact and jqwik

Mastering API Testing with Quarkus: From RestAssured to Pact and jqwik

Comments
1 min read
How to Secure Your C# Applications: Best Practices & Code Examples
Cover image for How to Secure Your C# Applications: Best Practices & Code Examples

How to Secure Your C# Applications: Best Practices & Code Examples

Comments
10 min read
How I Secure APIs — Practical Steps I Use Every Day
Cover image for How I Secure APIs — Practical Steps I Use Every Day

How I Secure APIs — Practical Steps I Use Every Day

Comments
2 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Cover image for Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

1
Comments
4 min read
Genesis DB - The GDPR-ready event-sourcing database engine

Genesis DB - The GDPR-ready event-sourcing database engine

1
Comments
1 min read
Prometheus & Grafana: The Art and Science of System Insight
Cover image for Prometheus & Grafana: The Art and Science of System Insight

Prometheus & Grafana: The Art and Science of System Insight

1
Comments
4 min read
7 Tips for Securing Nginx with TLS and Firewall Rules Today

7 Tips for Securing Nginx with TLS and Firewall Rules Today

Comments
3 min read
Outil de Cybersécurité du Jour - Sep 24, 2025

Outil de Cybersécurité du Jour - Sep 24, 2025

1
Comments
3 min read
7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

Comments
3 min read
Protecting against cross-site scripting with trusted types
Cover image for Protecting against cross-site scripting with trusted types

Protecting against cross-site scripting with trusted types

Comments
4 min read
Threat Hunting With ZoomEye 2025
Cover image for Threat Hunting With ZoomEye 2025

Threat Hunting With ZoomEye 2025

Comments
5 min read
7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

Comments
3 min read
What is the best SSH server management?

What is the best SSH server management?

Comments
1 min read
Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas
Cover image for Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

1
Comments
4 min read
The Problem With Legacy Access

The Problem With Legacy Access

4
Comments
1 min read
📰 Major Tech News: September 23, 2025
Cover image for 📰 Major Tech News: September 23, 2025

📰 Major Tech News: September 23, 2025

20
Comments 4
4 min read
loading...