Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide
Cover image for Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

6
Comments
3 min read
Building an Enterprise Data Access Layer: The Foundation
Cover image for Building an Enterprise Data Access Layer: The Foundation

Building an Enterprise Data Access Layer: The Foundation

2
Comments
2 min read
Module 2 — Derived Identities and Secure Export
Cover image for Module 2 — Derived Identities and Secure Export

Module 2 — Derived Identities and Secure Export

1
Comments
4 min read
Introducing SecureCheck: An Open-Source Security Scanner for Web Applications
Cover image for Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Comments
2 min read
Day 44 of Data analytics journey !
Cover image for Day 44 of Data analytics journey !

Day 44 of Data analytics journey !

1
Comments
2 min read
Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)
Cover image for Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

2
Comments
4 min read
Understanding HOTP and TOTP in Two-Factor Authentication 10:35

Understanding HOTP and TOTP in Two-Factor Authentication

2
Comments
3 min read
Building My S3 Security Scanner: A Solo Dev's Journey to Automate AWS Bucket Safety
Cover image for Building My S3 Security Scanner: A Solo Dev's Journey to Automate AWS Bucket Safety

Building My S3 Security Scanner: A Solo Dev's Journey to Automate AWS Bucket Safety

Comments
3 min read
HashGate - HMAC Authentication Implementation

HashGate - HMAC Authentication Implementation

Comments
7 min read
Build an Email OTP Verification System in Node.js (Step-by-Step)
Cover image for Build an Email OTP Verification System in Node.js (Step-by-Step)

Build an Email OTP Verification System in Node.js (Step-by-Step)

5
Comments
11 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Comments
2 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)
Cover image for Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.