Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Secure Your C# Applications: Best Practices & Code Examples
Cover image for How to Secure Your C# Applications: Best Practices & Code Examples

How to Secure Your C# Applications: Best Practices & Code Examples

Comments
10 min read
Understanding Docker multi-stage builds
Cover image for Understanding Docker multi-stage builds

Understanding Docker multi-stage builds

4
Comments
4 min read
How Much Do We Really Lose to Video Game Piracy?
Cover image for How Much Do We Really Lose to Video Game Piracy?

How Much Do We Really Lose to Video Game Piracy?

2
Comments
5 min read
How I Secure APIs — Practical Steps I Use Every Day
Cover image for How I Secure APIs — Practical Steps I Use Every Day

How I Secure APIs — Practical Steps I Use Every Day

Comments
2 min read
Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT
Cover image for Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Who Governs Your NHIs? The Challenge of Defining Ownership in Modern Enterprise IT

Comments
7 min read
Fundamental Concepts Of Cloud Computing
Cover image for Fundamental Concepts Of Cloud Computing

Fundamental Concepts Of Cloud Computing

5
Comments 1
2 min read
7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

7 Tips for Hardening TLS and HTTP/2 on Nginx for Production

1
Comments
4 min read
7 Tips for Securing Nginx with TLS and Firewall Rules Today

7 Tips for Securing Nginx with TLS and Firewall Rules Today

Comments
3 min read
Why Cyber Security Risk Quantification is Key to Creating a Futureproof Security Strategy
Cover image for Why Cyber Security Risk Quantification is Key to Creating a Futureproof Security Strategy

Why Cyber Security Risk Quantification is Key to Creating a Futureproof Security Strategy

Comments
3 min read
Outil de Cybersécurité du Jour - Sep 24, 2025

Outil de Cybersécurité du Jour - Sep 24, 2025

1
Comments
3 min read
7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

Comments
3 min read
Samba on Linux - File Sharing for Mixed Environments
Cover image for Samba on Linux - File Sharing for Mixed Environments

Samba on Linux - File Sharing for Mixed Environments

5
Comments 1
5 min read
Protecting against cross-site scripting with trusted types
Cover image for Protecting against cross-site scripting with trusted types

Protecting against cross-site scripting with trusted types

Comments
4 min read
Turbocharge Your Code Security: AI Bug Hunting is Here

Turbocharge Your Code Security: AI Bug Hunting is Here

Comments
2 min read
Threat Hunting With ZoomEye 2025
Cover image for Threat Hunting With ZoomEye 2025

Threat Hunting With ZoomEye 2025

Comments
5 min read
7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

7 Tips for Securing Nginx with TLS and HTTP/2 on Production Servers

Comments
3 min read
Zonas de governança: playground vs. produção

Zonas de governança: playground vs. produção

1
Comments
1 min read
What is the best SSH server management?

What is the best SSH server management?

Comments
1 min read
Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas
Cover image for Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

Obscura: la nueva y oscura variante de ransomware que pone en jaque a las empresas

1
Comments
4 min read
Price Oracle Manipulation:
Cover image for Price Oracle Manipulation:

Price Oracle Manipulation:

2
Comments
2 min read
The Problem With Legacy Access

The Problem With Legacy Access

4
Comments
1 min read
Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI
Cover image for Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI

Can We Really Trust AI? Lies, Poison, and the Need for Responsible AI

3
Comments
6 min read
How the Dark Web Actually Works: The Tech Behind the Curtain(part2)
Cover image for How the Dark Web Actually Works: The Tech Behind the Curtain(part2)

How the Dark Web Actually Works: The Tech Behind the Curtain(part2)

10
Comments 1
3 min read
Secure Embeddable Chatbots for SaaS: Auth & Security Guide
Cover image for Secure Embeddable Chatbots for SaaS: Auth & Security Guide

Secure Embeddable Chatbots for SaaS: Auth & Security Guide

1
Comments
4 min read
Myth-Busting: Common TLS Misconceptions That Slow Down Your Site

Myth-Busting: Common TLS Misconceptions That Slow Down Your Site

Comments
3 min read
loading...