Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementing JWT Authentication with Express, MongoDB, and Passport.js

Implementing JWT Authentication with Express, MongoDB, and Passport.js

8
Comments
14 min read
Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

3
Comments
4 min read
🔐🛡️ Var, Let, Const: How Declaration Choices Affect Your Code's Security

🔐🛡️ Var, Let, Const: How Declaration Choices Affect Your Code's Security

Comments
3 min read
Simple way to store secrets in Android Project.

Simple way to store secrets in Android Project.

4
Comments
2 min read
🛡️An Introduction to Secure Coding Practices🛡️

🛡️An Introduction to Secure Coding Practices🛡️

1
Comments
2 min read
Implementing a Dynamic RBAC System for Enterprise Applications - Simplified

Implementing a Dynamic RBAC System for Enterprise Applications - Simplified

1
Comments
4 min read
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

2
Comments
8 min read
Securing Kubernetes Production: Avoid These 11 Common Misconfigurations

Securing Kubernetes Production: Avoid These 11 Common Misconfigurations

1
Comments
8 min read
Extensive threat detection and monitoring features of AWS Security Services

Extensive threat detection and monitoring features of AWS Security Services

1
Comments
8 min read
Uncomplicated Firewall (UFW)

Uncomplicated Firewall (UFW)

2
Comments 1
5 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
An Opinionated Ramp Up Guide to AWS Pentesting

An Opinionated Ramp Up Guide to AWS Pentesting

1
Comments
15 min read
How to Implement HashiCorp Vault SSH Secrets Engine for securing SSH access

How to Implement HashiCorp Vault SSH Secrets Engine for securing SSH access

3
Comments
4 min read
3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

Comments
1 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Segunda parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Segunda parte

Comments
5 min read
Server Certificate Chain

Server Certificate Chain

Comments
3 min read
Effective Strategies for MySQL User Management

Effective Strategies for MySQL User Management

Comments
1 min read
Make your App 10x Secure with Arcjet Protection Layer

Make your App 10x Secure with Arcjet Protection Layer

47
Comments 7
22 min read
Intersection of AI and Data Privacy

Intersection of AI and Data Privacy

2
Comments
4 min read
[picoctf]Binary Search writeup

[picoctf]Binary Search writeup

17
Comments
1 min read
[picoctf] Scan Surprise writeup

[picoctf] Scan Surprise writeup

5
Comments
1 min read
Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

9
Comments
3 min read
Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Comments
1 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

58
Comments
6 min read
loading...