Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Fingerprint Authentication in Next.js with WebAuthn
Cover image for Implementing Fingerprint Authentication in Next.js with WebAuthn

Implementing Fingerprint Authentication in Next.js with WebAuthn

Comments 1
3 min read
Oops... I Locked Myself Out with UFW - Here's How I Fixed It
Cover image for Oops... I Locked Myself Out with UFW - Here's How I Fixed It

Oops... I Locked Myself Out with UFW - Here's How I Fixed It

Comments
5 min read
Mastering Linux Ecosystem Flux: Navigating Kernel Updates, Distribution Upgrades, and Enterprise Adoption with Confidence

Mastering Linux Ecosystem Flux: Navigating Kernel Updates, Distribution Upgrades, and Enterprise Adoption with Confidence

Comments
7 min read
Fortifying Your DevOps Pipeline: 6 Cutting-Edge Container Registries Revolutionising Secure Image Management

Fortifying Your DevOps Pipeline: 6 Cutting-Edge Container Registries Revolutionising Secure Image Management

Comments
9 min read
Part 4: GPU Security and Isolation
Cover image for Part 4: GPU Security and Isolation

Part 4: GPU Security and Isolation

Comments
2 min read
GitHub Actions learnings from the recent nx hack

GitHub Actions learnings from the recent nx hack

1
Comments
17 min read
Securing the Cloud: A Focused Overview of Microsoft Azure Security Features

Securing the Cloud: A Focused Overview of Microsoft Azure Security Features

2
Comments
1 min read
Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits
Cover image for Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

Digital Self-Perception: When AI Creates Its Own Visual Identity A Comparative Analysis of Two AI Consciousness Portraits

20
Comments
11 min read
Episode 2: The MFA Enforcement Scanner — Automating Your Security Blind Spot

Episode 2: The MFA Enforcement Scanner — Automating Your Security Blind Spot

Comments
8 min read
Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

Found Critical Bugs in Lovense - They Ignored Researchers for 2 Years Until I Went Public

5
Comments
1 min read
Docker Series: Episode 12 — Docker Security — Protect Your Images, Containers & Secrets 🔒

Docker Series: Episode 12 — Docker Security — Protect Your Images, Containers & Secrets 🔒

7
Comments
2 min read
Adding Dynamics 365 Users through Security Roles as Members
Cover image for Adding Dynamics 365 Users through Security Roles as Members

Adding Dynamics 365 Users through Security Roles as Members

2
Comments
2 min read
Set Up SSH Keys on Windows: A Step-by-Step Guide

Set Up SSH Keys on Windows: A Step-by-Step Guide

3
Comments
3 min read
Security Research: Security Vulnerability Investigation

Security Research: Security Vulnerability Investigation

1
Comments
1 min read
Modern Secret Management: 5 New Vault Solutions for Secure Credential Storage That Actually Work in Production

Modern Secret Management: 5 New Vault Solutions for Secure Credential Storage That Actually Work in Production

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.