Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together
Cover image for OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Comments
7 min read
AWS IAM POLICIES Deep Dive
Cover image for AWS IAM POLICIES Deep Dive

AWS IAM POLICIES Deep Dive

1
Comments
4 min read
AWS Security Hub in Action: Expert Strategies for Threat Detection and Compliance

AWS Security Hub in Action: Expert Strategies for Threat Detection and Compliance

Comments
11 min read
Secure Your Spring API With JWT and MongoDB
Cover image for Secure Your Spring API With JWT and MongoDB

Secure Your Spring API With JWT and MongoDB

11
Comments 2
13 min read
Dotenv files annoyed me into writing Polyenv

Dotenv files annoyed me into writing Polyenv

4
Comments 1
7 min read
Securely Send SMS with Twilio, AWS Lambda, and Terraform

Securely Send SMS with Twilio, AWS Lambda, and Terraform

1
Comments
4 min read
DOM-based XSS in-depth

DOM-based XSS in-depth

1
Comments 1
6 min read
The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

1
Comments
2 min read
Connections and workflows updates in September

Connections and workflows updates in September

6
Comments
1 min read
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

Comments
4 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Essential JWT Security Best Practices for Developers
Cover image for Essential JWT Security Best Practices for Developers

Essential JWT Security Best Practices for Developers

19
Comments 6
6 min read
The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite
Cover image for The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

1
Comments
10 min read
Mastering Identity Management in Microsoft Entra ID: From Users to Roles
Cover image for Mastering Identity Management in Microsoft Entra ID: From Users to Roles

Mastering Identity Management in Microsoft Entra ID: From Users to Roles

6
Comments
3 min read
How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

1
Comments 1
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.