Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Laravel Data Encryption and Decryption

Laravel Data Encryption and Decryption

1
Comments 2
3 min read
Demystifying OTPs: the logic behind the offline generation of tokens

Demystifying OTPs: the logic behind the offline generation of tokens

10
Comments 2
16 min read
JSON Web Tokens (JWT)

JSON Web Tokens (JWT)

52
Comments 7
2 min read
Managing traffic using iptables firewall

Managing traffic using iptables firewall

Comments
3 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
Secure AWS VPC using Public and Private Subnets

Secure AWS VPC using Public and Private Subnets

3
Comments
10 min read
The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

2
Comments 1
4 min read
Looking for some feedback on my team's new open-source secrets vault project.

Looking for some feedback on my team's new open-source secrets vault project.

2
Comments 2
1 min read
Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

5
Comments
4 min read
Turning a Customer Security Concern into a Feature

Turning a Customer Security Concern into a Feature

4
Comments
2 min read
picoCTF "Breadth" Walkthrough

picoCTF "Breadth" Walkthrough

Comments
5 min read
AI Engineer's Tool Review: Guardrails AI

AI Engineer's Tool Review: Guardrails AI

Comments
1 min read
The Role of Machine Learning in Enhancing Network Security

The Role of Machine Learning in Enhancing Network Security

1
Comments
3 min read
CCSP Study Guide: How to Prepare for the CCSP Exam

CCSP Study Guide: How to Prepare for the CCSP Exam

Comments 1
5 min read
Ensuring Secure and Efficient Banking Apps through Rigorous Testing

Ensuring Secure and Efficient Banking Apps through Rigorous Testing

4
Comments
5 min read
🍯 Honeypot field: an easy to implement React security technique

🍯 Honeypot field: an easy to implement React security technique

1
Comments
2 min read
Cloud Security with AWS IAM

Cloud Security with AWS IAM

Comments
1 min read
Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
Two Years in the Vault: 4 Best Practices 🔒

Two Years in the Vault: 4 Best Practices 🔒

11
Comments
9 min read
What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

5
Comments
1 min read
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

5
Comments
2 min read
Introduction to DevSecOps

Introduction to DevSecOps

40
Comments 3
3 min read
What Is security.txt and How Can It Help Improve Website Security?

What Is security.txt and How Can It Help Improve Website Security?

2
Comments
3 min read
🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

9
Comments 2
3 min read
loading...