Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🐧 Hardening Linux: практическое руководство для безопасной работы
Cover image for 🐧 Hardening Linux: практическое руководство для безопасной работы

🐧 Hardening Linux: практическое руководство для безопасной работы

2
Comments
2 min read
ShieldX - A Vietnamese developer's dream to make enterprise security accessible
Cover image for ShieldX - A Vietnamese developer's dream to make enterprise security accessible

ShieldX - A Vietnamese developer's dream to make enterprise security accessible

1
Comments
2 min read
My Journey into Programming: From Curiosity to Code

My Journey into Programming: From Curiosity to Code

Comments
1 min read
Privacy Is Broken in Everyday Tools — But the Browser Can Fix It
Cover image for Privacy Is Broken in Everyday Tools — But the Browser Can Fix It

Privacy Is Broken in Everyday Tools — But the Browser Can Fix It

1
Comments
4 min read
Getting Started With Queryable Encryption With the MongoDB EF Core Provider
Cover image for Getting Started With Queryable Encryption With the MongoDB EF Core Provider

Getting Started With Queryable Encryption With the MongoDB EF Core Provider

2
Comments
8 min read
Step-by-Step Guide: Scanning Your .NET Project with SonarQube
Cover image for Step-by-Step Guide: Scanning Your .NET Project with SonarQube

Step-by-Step Guide: Scanning Your .NET Project with SonarQube

1
Comments
2 min read
Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails
Cover image for Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails

Building a Scalable AWS Multi-Account Environment with Control Tower, Terraform AFT, and SCP Guardrails

Comments
6 min read
My Freelance Journey and a Safe Dive into XSS (Cross-Site Scripting) 🌐💻

My Freelance Journey and a Safe Dive into XSS (Cross-Site Scripting) 🌐💻

7
Comments
2 min read
Getting Started with Spring Security: Securing Your First Spring Boot Application (Basic Auth)

Getting Started with Spring Security: Securing Your First Spring Boot Application (Basic Auth)

2
Comments
7 min read
IAM: Prioritizing Security Is More Than a Method

IAM: Prioritizing Security Is More Than a Method

Comments
4 min read
第 21 课:Freqtrade-交易所 API 配置

第 21 课:Freqtrade-交易所 API 配置

3
Comments 2
3 min read
Volant — Spin up real microVMs in 10 seconds
Cover image for Volant — Spin up real microVMs in 10 seconds

Volant — Spin up real microVMs in 10 seconds

Comments
2 min read
Lesson 21: Freqtrade-Exchange API Configuration

Lesson 21: Freqtrade-Exchange API Configuration

Comments
9 min read
Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats
Cover image for Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats

Cybersecurity for Game Developers: How to Protect Your Projects from Cyber Threats

Comments
6 min read
🐳 Enterprise-Grade Containerization for Node.js Backends
Cover image for 🐳 Enterprise-Grade Containerization for Node.js Backends

🐳 Enterprise-Grade Containerization for Node.js Backends

Comments
5 min read
EnvSecOps: Nix, Recognized: The Strongest Bag Wins

EnvSecOps: Nix, Recognized: The Strongest Bag Wins

4
Comments
2 min read
🔐 PCI DSS Compliance in Mobile Payment Systems

🔐 PCI DSS Compliance in Mobile Payment Systems

Comments
10 min read
The Secret to Secure Cloud Access from Restricted Regions: Reverse Proxy Everything

The Secret to Secure Cloud Access from Restricted Regions: Reverse Proxy Everything

Comments
3 min read
Achieving Least Privilege in Docker
Cover image for Achieving Least Privilege in Docker

Achieving Least Privilege in Docker

3
Comments
5 min read
How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)
Cover image for How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)

How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)

Comments
10 min read
How I Built a Django Honeypot to Catch Attackers (and What I Learned)

How I Built a Django Honeypot to Catch Attackers (and What I Learned)

3
Comments
2 min read
🧭 Runbook: Como Rodar um Playbook Ansible com Pipeline CI/CD e SSH via Bastion

🧭 Runbook: Como Rodar um Playbook Ansible com Pipeline CI/CD e SSH via Bastion

Comments
5 min read
EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

Comments
3 min read
The 5 Steps of Threat Modeling in a Startup

The 5 Steps of Threat Modeling in a Startup

1
Comments
3 min read
Your AI Chatbot Just Leaked Customer Data to OpenAI. Here’s How it Happened and How to Prevent it

Your AI Chatbot Just Leaked Customer Data to OpenAI. Here’s How it Happened and How to Prevent it

Comments
33 min read
loading...