Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Ultimate Checklist for TLS Hardening on Nginx Servers

The Ultimate Checklist for TLS Hardening on Nginx Servers

Comments
3 min read
Enhancing Account Security in Microsoft Entra ID: Password Protection and Self-Service Reset
Cover image for Enhancing Account Security in Microsoft Entra ID: Password Protection and Self-Service Reset

Enhancing Account Security in Microsoft Entra ID: Password Protection and Self-Service Reset

6
Comments 1
3 min read
Υλοποίηση controllers και προσθήκη JWT και swagger

Υλοποίηση controllers και προσθήκη JWT και swagger

Comments
2 min read
Beyond API Keys: Token Exchange, Identity Federation & MCP Servers

Beyond API Keys: Token Exchange, Identity Federation & MCP Servers

7
Comments
5 min read
What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

What Happens if We Get Hacked? A Transparent Look at the Musical Chairs Security Model

Comments
6 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner
Cover image for Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

6
Comments 1
5 min read
How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™
Cover image for How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

4
Comments
5 min read
Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats
Cover image for Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats

Don't Get Hacked! The Business Owner's Survival Guide to Cyber Threats

4
Comments 1
9 min read
7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

7 Tips for Hardening TLS on Nginx for Secure Web Traffic and Performance

Comments
3 min read
How to use JWTokens properly

How to use JWTokens properly

Comments
3 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers
Cover image for 🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

🚨 I Almost Got Hacked: A Sophisticated Job Scam Targeting Developers

6
Comments 5
6 min read
7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

Comments
4 min read
Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

Web Dev Cybersecurity: Securing Login Flows Beyond ZAP’s Reach.

1
Comments
3 min read
Checklist of email deliverability tips for B2B marketers

Checklist of email deliverability tips for B2B marketers

Comments
1 min read
After 20 Years in Technology, AI is the First Thing That Actually Changed How I Work

After 20 Years in Technology, AI is the First Thing That Actually Changed How I Work

1
Comments
9 min read
Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Comments
2 min read
Generate Strong, Reproducible Passwords with Patterns & Grids

Generate Strong, Reproducible Passwords with Patterns & Grids

Comments
1 min read
Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation
Cover image for Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation

Improving Binary Security in Mobile Application: A Deep Dive into Obfuscation

Comments
5 min read
Quantum Dawn: Hardening Our Networks Before the Storm

Quantum Dawn: Hardening Our Networks Before the Storm

Comments
2 min read
Hash Generator: The Complete Guide to Cryptographic Hashing

Hash Generator: The Complete Guide to Cryptographic Hashing

5
Comments
13 min read
Unlocking Ultra-Efficient Edge AI: Encrypted Inference at the Speed of Memory

Unlocking Ultra-Efficient Edge AI: Encrypted Inference at the Speed of Memory

Comments
2 min read
7 Tips for Hardening Nginx: TLS, Fail2Ban, and WAF Configuration

7 Tips for Hardening Nginx: TLS, Fail2Ban, and WAF Configuration

Comments
3 min read
How CAPTCHA Secures Websites and Why We Use It ✅
Cover image for How CAPTCHA Secures Websites and Why We Use It ✅

How CAPTCHA Secures Websites and Why We Use It ✅

3
Comments
2 min read
Binarized Brilliance: Unlocking Edge AI with Secure In-Memory Networks

Binarized Brilliance: Unlocking Edge AI with Secure In-Memory Networks

Comments
2 min read
loading...