Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Secure and Resilient Design
Cover image for Secure and Resilient Design

Secure and Resilient Design

2
Comments
16 min read
Enhancing OIDC security with demonstrating proof of possession (DPoP)

Enhancing OIDC security with demonstrating proof of possession (DPoP)

15
Comments
3 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

Comments
6 min read
Access Token & Refresh Token: A Breakdown
Cover image for Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

1
Comments
2 min read
Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)
Cover image for Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

6
Comments
4 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)
Cover image for Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

5
Comments
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)
Cover image for Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

4
Comments
3 min read
Configuring Routes for a Web Application using Azure Firewall (Part 4)
Cover image for Configuring Routes for a Web Application using Azure Firewall (Part 4)

Configuring Routes for a Web Application using Azure Firewall (Part 4)

Comments
2 min read
SCA vs SAST - Security Tools Comparison 🛡️
Cover image for SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Simple OAuth 2.0 Framework for Authentication (Freeware)

Simple OAuth 2.0 Framework for Authentication (Freeware)

Comments
1 min read
Issue 53 of AWS Cloud Security Weekly
Cover image for Issue 53 of AWS Cloud Security Weekly

Issue 53 of AWS Cloud Security Weekly

4
Comments
1 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1
Cover image for Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

6
Comments
2 min read
Deep Dive into Elastic Cloud Enterprise (ECE)
Cover image for Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

5
Comments
8 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
1 min read
Exporting private keys in plang programming language
Cover image for Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.