Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Build Your Unshakeable AWS Cloud Security Career: The Practical Roadmap Employers Crave

Build Your Unshakeable AWS Cloud Security Career: The Practical Roadmap Employers Crave

Comments
2 min read
Serverless Security: Building Trust in the Cloud
Cover image for Serverless Security: Building Trust in the Cloud

Serverless Security: Building Trust in the Cloud

Comments
5 min read
Penetration Testing Firms: 10 Red Flags Every Business Should Know
Cover image for Penetration Testing Firms: 10 Red Flags Every Business Should Know

Penetration Testing Firms: 10 Red Flags Every Business Should Know

1
Comments
22 min read
Zeroize: The Tiny and Memory-Safe Rust Crate
Cover image for Zeroize: The Tiny and Memory-Safe Rust Crate

Zeroize: The Tiny and Memory-Safe Rust Crate

1
Comments
2 min read
Snowflake Architecture Series: A Foundational Checklist

Snowflake Architecture Series: A Foundational Checklist

Comments
11 min read
Your application should be PCI-DSS-compliant
Cover image for Your application should be PCI-DSS-compliant

Your application should be PCI-DSS-compliant

5
Comments
5 min read
Segurança com Zabbix

Segurança com Zabbix

Comments
2 min read
Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn
Cover image for Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

3
Comments
4 min read
The Ruby OAuth Collective
Cover image for The Ruby OAuth Collective

The Ruby OAuth Collective

6
Comments 2
1 min read
AWS Auth Caching Strategies
Cover image for AWS Auth Caching Strategies

AWS Auth Caching Strategies

16
Comments 1
7 min read
Reference Architecture for Team AI Productivity
Cover image for Reference Architecture for Team AI Productivity

Reference Architecture for Team AI Productivity

5
Comments
9 min read
La cybersécurité et les mots de passe

La cybersécurité et les mots de passe

Comments
1 min read
How to Use NFC for Contactless Door Access (with Code Examples)

How to Use NFC for Contactless Door Access (with Code Examples)

Comments
4 min read
100DaysOfCode — Day 28

100DaysOfCode — Day 28

Comments
1 min read
Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)
Cover image for Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

5
Comments
4 min read
How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront
Cover image for How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

3
Comments
3 min read
Preventing the Qantas Cyberattack: What Could Have Been Done Differently?

Preventing the Qantas Cyberattack: What Could Have Been Done Differently?

1
Comments
5 min read
Understanding Port 443: The Backbone of HTTPS Explained
Cover image for Understanding Port 443: The Backbone of HTTPS Explained

Understanding Port 443: The Backbone of HTTPS Explained

Comments
5 min read
Sketching AI Security: Identity and Security Challenges in AI Development
Cover image for Sketching AI Security: Identity and Security Challenges in AI Development

Sketching AI Security: Identity and Security Challenges in AI Development

7
Comments 1
13 min read
วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

Comments 1
1 min read
SWIFT Sandbox Certificate failure during consuming SWIFT/ API from SWIFT/ SDK application

SWIFT Sandbox Certificate failure during consuming SWIFT/ API from SWIFT/ SDK application

Comments 1
1 min read
Introducing SecretLink: The Secure Way to Share Sensitive Information
Cover image for Introducing SecretLink: The Secure Way to Share Sensitive Information

Introducing SecretLink: The Secure Way to Share Sensitive Information

Comments
2 min read
Is innerHTML Dangerous? Myth vs Reality
Cover image for Is innerHTML Dangerous? Myth vs Reality

Is innerHTML Dangerous? Myth vs Reality

3
Comments
2 min read
How to Implement Refresh Tokens and Token Revocation in ASP.NET Core
Cover image for How to Implement Refresh Tokens and Token Revocation in ASP.NET Core

How to Implement Refresh Tokens and Token Revocation in ASP.NET Core

1
Comments 1
9 min read
Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs
Cover image for Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs

Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs

6
Comments
10 min read
loading...