Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Security Threat Detection in DevSecOps

Security Threat Detection in DevSecOps

2
Comments
2 min read
Why Cloud Security Needs a New Playbook: Introducing CNAMM
Cover image for Why Cloud Security Needs a New Playbook: Introducing CNAMM

Why Cloud Security Needs a New Playbook: Introducing CNAMM

Comments
4 min read
𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

Comments
1 min read
Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Datacenter Proxies vs. Residential Proxies: What Does the Future Hold?

Comments
3 min read
Self-taught Front-End Dev seeking to grow network

Self-taught Front-End Dev seeking to grow network

Comments
1 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
4 min read
How to Run Models Locally: A Step-by-Step Guide for Non-Techies
Cover image for How to Run Models Locally: A Step-by-Step Guide for Non-Techies

How to Run Models Locally: A Step-by-Step Guide for Non-Techies

1
Comments
3 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises
Cover image for Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
How to Protect Your Cloud Infrastructure from DDoS Attacks
Cover image for How to Protect Your Cloud Infrastructure from DDoS Attacks

How to Protect Your Cloud Infrastructure from DDoS Attacks

Comments
5 min read
Automated Penetration Testing: A Guide to Domain Collection
Cover image for Automated Penetration Testing: A Guide to Domain Collection

Automated Penetration Testing: A Guide to Domain Collection

Comments
1 min read
Avoiding Production Disasters with npm ci: The Key to Stable Deployments
Cover image for Avoiding Production Disasters with npm ci: The Key to Stable Deployments

Avoiding Production Disasters with npm ci: The Key to Stable Deployments

6
Comments 1
3 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.
Cover image for Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Future of Phishing Attacks with AI
Cover image for Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Why we as Europeans need to ditch US tech and how

Why we as Europeans need to ditch US tech and how

2
Comments 4
4 min read
Code Reviews with AI: a Developer Guide
Cover image for Code Reviews with AI: a Developer Guide

Code Reviews with AI: a Developer Guide

5
Comments 3
10 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
Security news weekly round-up - 7th February 2025
Cover image for Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
Intro to Service Workers: Best Practices & Threat Mitigation
Cover image for Intro to Service Workers: Best Practices & Threat Mitigation

Intro to Service Workers: Best Practices & Threat Mitigation

2
Comments 1
4 min read
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

6
Comments
4 min read
Best Practices for Storing Access Tokens in the Browser
Cover image for Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

1
Comments
2 min read
loading...