Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
IAM Identity Center com Terraform

IAM Identity Center com Terraform

4
Comments
4 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users
Cover image for Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments 1
2 min read
The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks
Cover image for The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

Comments
6 min read
Five Ways Your CI/CD Pipeline Can Be Exploited
Cover image for Five Ways Your CI/CD Pipeline Can Be Exploited

Five Ways Your CI/CD Pipeline Can Be Exploited

2
Comments
5 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk
Cover image for A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
Re-learning security: Encryption, Encoding, Hashing ☄
Cover image for Re-learning security: Encryption, Encoding, Hashing ☄

Re-learning security: Encryption, Encoding, Hashing ☄

Comments
7 min read
Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Comments
10 min read
Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.
Cover image for Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

6
Comments
5 min read
Integrating Azure Secrets into your .NET Web Application
Cover image for Integrating Azure Secrets into your .NET Web Application

Integrating Azure Secrets into your .NET Web Application

Comments
3 min read
Protect secrets in Git with the clean/smudge filter
Cover image for Protect secrets in Git with the clean/smudge filter

Protect secrets in Git with the clean/smudge filter

Comments
4 min read
How to Onboard and Protect Remote Teams with Secure Cloud Environments
Cover image for How to Onboard and Protect Remote Teams with Secure Cloud Environments

How to Onboard and Protect Remote Teams with Secure Cloud Environments

7
Comments 1
5 min read
Comparison between Data Privacy & Data Security
Cover image for Comparison between Data Privacy & Data Security

Comparison between Data Privacy & Data Security

Comments
3 min read
pip-audit: Managing pip Vulnerabilities

pip-audit: Managing pip Vulnerabilities

Comments
2 min read
Preventing Multiple Failed Input Attack using Redis and NodeJS
Cover image for Preventing Multiple Failed Input Attack using Redis and NodeJS

Preventing Multiple Failed Input Attack using Redis and NodeJS

Comments
4 min read
Comprehensive re:Cap security practice on AWS
Cover image for Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

7
Comments
17 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.