Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
WordPress Roles & Capabilities: A Practical Guide
Cover image for WordPress Roles & Capabilities: A Practical Guide

WordPress Roles & Capabilities: A Practical Guide

Comments
1 min read
Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks
Cover image for Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

Beware the Evil Twin: Exploring Wi-Fi Impersonation Attacks

12
Comments 3
4 min read
Handling password-protected PDFs in Javascript
Cover image for Handling password-protected PDFs in Javascript

Handling password-protected PDFs in Javascript

1
Comments
6 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
Cover image for Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
Getting my Laravel application security audited

Getting my Laravel application security audited

Comments
5 min read
Secure Your Node.js API Like a Bank Vault

Secure Your Node.js API Like a Bank Vault

Comments
2 min read
Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide
Cover image for Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Enhance Web App Security with OAuth 2.0 and JWT: A Developer's Guide

Comments
1 min read
5-Layer Windows Registry Anomaly Detection Using Python

5-Layer Windows Registry Anomaly Detection Using Python

Comments
1 min read
Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Next Stop: AWS Cloud "Cloud Security with IAM: Implementing Role-Based Access "

Comments
2 min read
Why Developers Seek an Auth0 Alternative

Why Developers Seek an Auth0 Alternative

Comments
2 min read
AWS re:Inforce 2025 keynote highlights
Cover image for AWS re:Inforce 2025 keynote highlights

AWS re:Inforce 2025 keynote highlights

5
Comments
9 min read
RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale
Cover image for RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

RSA Conference 2025: How Agentic AI Is Redefining Trust, Identity, and Access at Scale

Comments
10 min read
The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

The AI-Powered OSINT Investigator: Practical Applications and Ethical Frontiers

Comments 1
4 min read
Most Valuable When Least Visible | The Security Paradox

Most Valuable When Least Visible | The Security Paradox

Comments
3 min read
Face Recognition for Crypto: Enhancing Security and Trust
Cover image for Face Recognition for Crypto: Enhancing Security and Trust

Face Recognition for Crypto: Enhancing Security and Trust

Comments
1 min read
Java Microservices on Kubernetes: A Step-by-Step Guide

Java Microservices on Kubernetes: A Step-by-Step Guide

Comments
1 min read
🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

5
Comments 2
3 min read
Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Mastering Kubernetes Security: A Practical Guide to Hardening Your Clusters

Comments
2 min read
Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

Securing Modern Systems: Advanced Threat Modeling for Cloud-Native & AI

1
Comments
8 min read
How to Effectively Vet Your Supply Chain for Optimal Performance
Cover image for How to Effectively Vet Your Supply Chain for Optimal Performance

How to Effectively Vet Your Supply Chain for Optimal Performance

5
Comments
4 min read
Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

Digital Twin of the Universe: The Deep Anatomy of Networks and the Rise of Cyber Consciousness

4
Comments
3 min read
Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Private 5G: The Game-Changer for Industrial IoT and Smart Factories

Comments
6 min read
Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Cybersecurity in the Age of Digital Risks: How to Avoid Critical Mistakes

Comments
2 min read
The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet
Cover image for The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

The ILOVEYOU Virus: When the First Social Engineering Attack Broke the Internet

Comments 1
4 min read
The New Battleground of Global Politics
Cover image for The New Battleground of Global Politics

The New Battleground of Global Politics

Comments
6 min read
loading...