Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Configuring a Microsoft Sentinel Environment (Part 1)
Cover image for Configuring a Microsoft Sentinel Environment (Part 1)

Configuring a Microsoft Sentinel Environment (Part 1)

1
Comments
2 min read
Automated Security Scanning for Docker Images on AWS
Cover image for Automated Security Scanning for Docker Images on AWS

Automated Security Scanning for Docker Images on AWS

Comments
14 min read
Managing NixOS Secrets via SOPS, sops-nix and opsops

Managing NixOS Secrets via SOPS, sops-nix and opsops

2
Comments
5 min read
How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide
Cover image for How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide

How to Launch an Ubuntu EC2 Instance in AWS: A Step-by-Step Guide

2
Comments
3 min read
🛡️🌐OWASP - Open Web Application Security Project
Cover image for 🛡️🌐OWASP - Open Web Application Security Project

🛡️🌐OWASP - Open Web Application Security Project

5
Comments 1
3 min read
NPM packages leveraged for cryptocurrency theft
Cover image for NPM packages leveraged for cryptocurrency theft

NPM packages leveraged for cryptocurrency theft

7
Comments
5 min read
Automated ways to security audit your website

Automated ways to security audit your website

35
Comments 1
6 min read
SharePoint solutions as a spyware
Cover image for SharePoint solutions as a spyware

SharePoint solutions as a spyware

1
Comments
6 min read
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Comments
4 min read
Understanding SSL/TLS in Kubernetes
Cover image for Understanding SSL/TLS in Kubernetes

Understanding SSL/TLS in Kubernetes

1
Comments
3 min read
How private are your class #private fields?

How private are your class #private fields?

Comments
3 min read
From ground to production: Deploying Workload Identities on AKS
Cover image for From ground to production: Deploying Workload Identities on AKS

From ground to production: Deploying Workload Identities on AKS

3
Comments 1
8 min read
From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

Comments
5 min read
Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

3
Comments
2 min read
Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

1
Comments
11 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.