Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Master Linux File Permissions While Your Coffee Brews
Cover image for Master Linux File Permissions While Your Coffee Brews

Master Linux File Permissions While Your Coffee Brews

2
Comments
4 min read
Security news weekly round-up - 17th January 2025
Cover image for Security news weekly round-up - 17th January 2025

Security news weekly round-up - 17th January 2025

1
Comments
3 min read
Enhancing Security with App Signature Verification
Cover image for Enhancing Security with App Signature Verification

Enhancing Security with App Signature Verification

21
Comments
3 min read
What does securing your AWS Environment look like in 2025?

What does securing your AWS Environment look like in 2025?

3
Comments
5 min read
Our blog is Hacked (blog.learnhub.africa)

Our blog is Hacked (blog.learnhub.africa)

4
Comments 6
1 min read
How Cerbos minimizes latency in Authorization workflows
Cover image for How Cerbos minimizes latency in Authorization workflows

How Cerbos minimizes latency in Authorization workflows

9
Comments
4 min read
Automate AWS Landing Zone Deployment
Cover image for Automate AWS Landing Zone Deployment

Automate AWS Landing Zone Deployment

Comments
9 min read
What is MACsec, and why is it important?
Cover image for What is MACsec, and why is it important?

What is MACsec, and why is it important?

7
Comments 1
7 min read
Don't use JWT for Authorization!
Cover image for Don't use JWT for Authorization!

Don't use JWT for Authorization!

20
Comments 11
5 min read
Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Comments
7 min read
Stop AI coding assistants from leaking your secrets

Stop AI coding assistants from leaking your secrets

5
Comments
1 min read
Docker Scout: Your Container Security Companion - A Developer's Guide
Cover image for Docker Scout: Your Container Security Companion - A Developer's Guide

Docker Scout: Your Container Security Companion - A Developer's Guide

3
Comments 1
3 min read
Master Linux File Types While Your Coffee Brews
Cover image for Master Linux File Types While Your Coffee Brews

Master Linux File Types While Your Coffee Brews

4
Comments
5 min read
Changing an established SSH connection without disconnecting
Cover image for Changing an established SSH connection without disconnecting

Changing an established SSH connection without disconnecting

Comments 1
4 min read
Implementing passwordless sign-in flow with email in Cognito

Implementing passwordless sign-in flow with email in Cognito

4
Comments
5 min read
Are millions of accounts vulnerable due to Google's OAuth Flaw?
Cover image for Are millions of accounts vulnerable due to Google's OAuth Flaw?

Are millions of accounts vulnerable due to Google's OAuth Flaw?

11
Comments 1
9 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):
Cover image for Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze
Cover image for Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze

Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze

9
Comments 1
6 min read
How to Create a Workspace in Metasploit Console
Cover image for How to Create a Workspace in Metasploit Console

How to Create a Workspace in Metasploit Console

Comments
1 min read
Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?
Cover image for Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

1
Comments
4 min read
Pushed Authorization Requests in .NET 9: Why and How to Use Them
Cover image for Pushed Authorization Requests in .NET 9: Why and How to Use Them

Pushed Authorization Requests in .NET 9: Why and How to Use Them

7
Comments
8 min read
Confidence in the cloud with data sovereignty

Confidence in the cloud with data sovereignty

Comments
3 min read
Issue 79 of AWS Cloud Security Weekly
Cover image for Issue 79 of AWS Cloud Security Weekly

Issue 79 of AWS Cloud Security Weekly

1
Comments
1 min read
Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

2
Comments
1 min read
Microsoft Security: A Comprehensive Approach to Digital Protection
Cover image for Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

1
Comments
3 min read
loading...