Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

Part 5: Cross-Site Scripting (XSS) Series - Reflected XSS – How It Works and How to Prevent It

11
Comments
4 min read
Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

Simplify Form Validation with FormGuardJS: A Lightweight and Flexible Solution

1
Comments
4 min read
Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

Introduction to CORS (Cross-Origin Resource Sharing) What is CORS?

4
Comments 1
3 min read
Strengthening Your Cloud Security with AWS Security & Identity Tools

Strengthening Your Cloud Security with AWS Security & Identity Tools

Comments
3 min read
What is CDR?

What is CDR?

Comments
3 min read
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Comments
1 min read
Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

Part 3: Cross-Site Scripting (XSS) Series - Recognizing and Identifying XSS Vulnerabilities

13
Comments 2
4 min read
Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Comments
5 min read
Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

Part 4: Cross-Site Scripting (XSS) Series - Stored XSS – A Deep Dive

10
Comments
5 min read
When to Start Secret Rotation

When to Start Secret Rotation

Comments
2 min read
Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

Part 2: Cross-Site Scripting (XSS) Series - Understanding the Anatomy of an XSS Attack — From Basics to Advanced Techniques

11
Comments
5 min read
Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

Part 1: Cross-Site Scripting (XSS) Series - Introduction to Cross-Site Scripting (XSS)

13
Comments
4 min read
Conquering Notification Overload: A Developer's Guide to Digital Peace

Conquering Notification Overload: A Developer's Guide to Digital Peace

2
Comments
2 min read
Unlocking the Secrets of Authentication: A Human's Guide to Digital Security 🔐

Unlocking the Secrets of Authentication: A Human's Guide to Digital Security 🔐

Comments
5 min read
Exploring AWS Networking and Content Delivery Services

Exploring AWS Networking and Content Delivery Services

Comments
3 min read
Wireshark Sniffing: Capturing and Analyzing Network Data Like a Pro

Wireshark Sniffing: Capturing and Analyzing Network Data Like a Pro

1
Comments
3 min read
[Série Auth/Aut] Introduction : l'importance du contrÎle d'accÚs

[Série Auth/Aut] Introduction : l'importance du contrÎle d'accÚs

5
Comments
5 min read
Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

Fixing Broken Access Control in Laravel: A Step-by-Step Guide with Coding Example

1
Comments
3 min read
Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

Automating Security Hub Findings Summary with Bedrock, Slack Notifications, and Zenhub Task Management

4
Comments 4
5 min read
Understanding Rate Limiting: A Guide to Protecting Your APIs and Applications

Understanding Rate Limiting: A Guide to Protecting Your APIs and Applications

4
Comments
4 min read
Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Comments
6 min read
Beyond Shift Left: Transforming Security from Reactive to Proactive Teamwork

Beyond Shift Left: Transforming Security from Reactive to Proactive Teamwork

2
Comments
3 min read
Amazon GuardDuty Extended Threat Detection

Amazon GuardDuty Extended Threat Detection

3
Comments
5 min read
5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments
4 min read
Phishing And Malware - A Practical Dive

Phishing And Malware - A Practical Dive

5
Comments
3 min read
loading...