Forem

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
A Novel Approach for Text Encryption Using Tokenizers in Ruby
Cover image for A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
Splitting Secrets Like a Spy: Shamirโ€™s Secret Sharing in Go

Splitting Secrets Like a Spy: Shamirโ€™s Secret Sharing in Go

1
Comments
3 min read
Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?
Cover image for Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

2
Comments
2 min read
Understanding AWS Cognito: A Complete Guide to User Authentication and Management

Understanding AWS Cognito: A Complete Guide to User Authentication and Management

2
Comments 1
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps
Cover image for Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow
Cover image for DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

Comments
2 min read
Stop Using Go Templates for SQL (Until You Read This)

Stop Using Go Templates for SQL (Until You Read This)

Comments
2 min read
Securing Client Communication: A Must for SMEs
Cover image for Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Modernizing Security Operations with Zero Trust Architecture on AWS
Cover image for Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
Tutorial: How to protect your business from referral fraud
Cover image for Tutorial: How to protect your business from referral fraud

Tutorial: How to protect your business from referral fraud

Comments
11 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
JSON + Prometheus SECURELY
Cover image for JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

Comments
1 min read
Best Practices for Secure PHP Coding
Cover image for Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

1
Comments
3 min read
Account Email and Password Change using .NET Identity
Cover image for Account Email and Password Change using .NET Identity

Account Email and Password Change using .NET Identity

1
Comments
6 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2
Cover image for Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
What is Zero Trust Security?
Cover image for What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 2
2 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
๐Ÿ” DeepSeek AI: Balance Power & Privacy ๐Ÿค–
Cover image for ๐Ÿ” DeepSeek AI: Balance Power & Privacy ๐Ÿค–

๐Ÿ” DeepSeek AI: Balance Power & Privacy ๐Ÿค–

Comments
1 min read
Attack Surface Mapping: A Comprehensive Guide
Cover image for Attack Surface Mapping: A Comprehensive Guide

Attack Surface Mapping: A Comprehensive Guide

Comments
4 min read
Web Security with Content Security Policy (CSP) and JavaScript
Cover image for Web Security with Content Security Policy (CSP) and JavaScript

Web Security with Content Security Policy (CSP) and JavaScript

Comments
4 min read
Understanding Proxy Servers
Cover image for Understanding Proxy Servers

Understanding Proxy Servers

1
Comments 1
4 min read
Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security
Cover image for Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Comments
6 min read
CEH: Advanced Penetration Testing Guide
Cover image for CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
loading...