Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM
Cover image for Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM

Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM

Comments
6 min read
Enterprise-Level Accounts in Crypto: Architecture, Access & Security Challenges
Cover image for Enterprise-Level Accounts in Crypto: Architecture, Access & Security Challenges

Enterprise-Level Accounts in Crypto: Architecture, Access & Security Challenges

11
Comments 1
3 min read
Do You Really Know Where Your API Keys End Up? A Security Guide for Fintech Developers
Cover image for Do You Really Know Where Your API Keys End Up? A Security Guide for Fintech Developers

Do You Really Know Where Your API Keys End Up? A Security Guide for Fintech Developers

26
Comments 3
8 min read
Passwords Are a Ticking Timebomb—And These Breaches Prove It
Cover image for Passwords Are a Ticking Timebomb—And These Breaches Prove It

Passwords Are a Ticking Timebomb—And These Breaches Prove It

Comments
2 min read
AutoSecure API Gateway: Permissions Redefined
Cover image for AutoSecure API Gateway: Permissions Redefined

AutoSecure API Gateway: Permissions Redefined

Comments
4 min read
QuickCollab - Permissions- First Workspace Collaboration App
Cover image for QuickCollab - Permissions- First Workspace Collaboration App

QuickCollab - Permissions- First Workspace Collaboration App

Comments 1
2 min read
HPKP: What is HTTP Public Key Pinning?
Cover image for HPKP: What is HTTP Public Key Pinning?

HPKP: What is HTTP Public Key Pinning?

Comments
5 min read
How to Stand Strong Against Cyberbullying
Cover image for How to Stand Strong Against Cyberbullying

How to Stand Strong Against Cyberbullying

Comments
3 min read
The Rising Threat of OTP Scams and How to Stay Safe
Cover image for The Rising Threat of OTP Scams and How to Stay Safe

The Rising Threat of OTP Scams and How to Stay Safe

Comments
3 min read
TUI tool for generating packets of arbitrary input and monitoring packets!
Cover image for TUI tool for generating packets of arbitrary input and monitoring packets!

TUI tool for generating packets of arbitrary input and monitoring packets!

1
Comments
1 min read
Incognito Mode Is a Lie Here’s Who Still Sees You
Cover image for Incognito Mode Is a Lie Here’s Who Still Sees You

Incognito Mode Is a Lie Here’s Who Still Sees You

Comments
3 min read
Future of Identity Security: What's Coming Next?

Future of Identity Security: What's Coming Next?

Comments
1 min read
Lock Down Your Account: Enforcing 2FA Setup on Login

Lock Down Your Account: Enforcing 2FA Setup on Login

Comments
1 min read
WordPress Nonces: Your First Line of Defense Against CSRF
Cover image for WordPress Nonces: Your First Line of Defense Against CSRF

WordPress Nonces: Your First Line of Defense Against CSRF

1
Comments
1 min read
What If DeFi Could Defend Itself? Meet Drosera.
Cover image for What If DeFi Could Defend Itself? Meet Drosera.

What If DeFi Could Defend Itself? Meet Drosera.

11
Comments 1
2 min read
Splunk Dashboards

Splunk Dashboards

Comments
4 min read
The Elegant Art of Killing 'unsafe-inline' in Your CSP

The Elegant Art of Killing 'unsafe-inline' in Your CSP

Comments
4 min read
Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions
Cover image for Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Comments
6 min read
Infineon Technologies: Pioneering Security, Sustainability, and Open Innovation

Infineon Technologies: Pioneering Security, Sustainability, and Open Innovation

1
Comments
8 min read
LLM App Security: Risk & Prevent for GenAI Development
Cover image for LLM App Security: Risk & Prevent for GenAI Development

LLM App Security: Risk & Prevent for GenAI Development

9
Comments
12 min read
Code Security for Developers: How to Write & Review Code Securely
Cover image for Code Security for Developers: How to Write & Review Code Securely

Code Security for Developers: How to Write & Review Code Securely

1
Comments 1
5 min read
How We Helped Teams Remediate 95% of Container CVEs Without Code Changes

How We Helped Teams Remediate 95% of Container CVEs Without Code Changes

6
Comments 1
2 min read
12-Word Seed Phrase Posted on YouTube ?? It Was a Trap.

12-Word Seed Phrase Posted on YouTube ?? It Was a Trap.

Comments
2 min read
Reglas administradas AWS WAF Owasp Top Ten
Cover image for Reglas administradas AWS WAF Owasp Top Ten

Reglas administradas AWS WAF Owasp Top Ten

3
Comments 2
7 min read
Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation
Cover image for Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

6
Comments
4 min read
loading...