Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)
Cover image for Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

Secure Your Site: A Practical Guide to Implementing Content Security Policy (CSP)

1
Comments
4 min read
SSIS Tip: How to Check the Project or Package Protection Level
Cover image for SSIS Tip: How to Check the Project or Package Protection Level

SSIS Tip: How to Check the Project or Package Protection Level

Comments
1 min read
Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

Implementing Secure Authentication: Practical Tactics for Digital Identity Defense

1
Comments
3 min read
Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching
Cover image for Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Tutorial: How to Remediate Vulnerabilities with Puppet Enterprise Advanced Patching

Comments
8 min read
Security Briefing: Security Flaw Analysis

Security Briefing: Security Flaw Analysis

2
Comments
3 min read
Threat Advisory: Security Flaw Defense

Threat Advisory: Security Flaw Defense

1
Comments
1 min read
Threat Intelligence: Security Flaw Exploitation

Threat Intelligence: Security Flaw Exploitation

1
Comments
1 min read
Security Analysis: None

Security Analysis: None

1
Comments
3 min read
Critical Security Flaw: Security Flaw Techniques

Critical Security Flaw: Security Flaw Techniques

1
Comments
1 min read
AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

AI-Generated Code in 2025: The Silent Security Crisis Developers Can’t Ignore

2
Comments
3 min read
OWASP Cornucopia Companion Edition
Cover image for OWASP Cornucopia Companion Edition

OWASP Cornucopia Companion Edition

3
Comments
2 min read
How to Deploy SafeLine WAF on a cPanel VPS

How to Deploy SafeLine WAF on a cPanel VPS

5
Comments
2 min read
A Hybrid Login-Linked Registration Method as a Security Measure Against Game Piracy

A Hybrid Login-Linked Registration Method as a Security Measure Against Game Piracy

5
Comments
5 min read
The Complete Guide to HTTP Cookies: What Every Web Developer Must Know
Cover image for The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

1
Comments 2
15 min read
How to Choose the Right Authentication Method for Your Backend
Cover image for How to Choose the Right Authentication Method for Your Backend

How to Choose the Right Authentication Method for Your Backend

4
Comments 1
4 min read
5 Ways Your Translation Processes Pose a Security Risk

5 Ways Your Translation Processes Pose a Security Risk

7
Comments
3 min read
Stuff we shipped in July

Stuff we shipped in July

4
Comments 1
1 min read
Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

Optional Advanced Layer: Custom Virtual Machine-Like Protection Using Open-Source Tools

5
Comments
4 min read
Embracing CDK: Use Case to Move from CloudFormation YAML to CDK?

Embracing CDK: Use Case to Move from CloudFormation YAML to CDK?

Comments
9 min read
Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)
Cover image for Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

Securing a VPS: Essential Hardening Steps for Web Developers (Part 1)

3
Comments 1
3 min read
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
Implementing Robust API Security Measures [Part 2]
Cover image for Implementing Robust API Security Measures [Part 2]

Implementing Robust API Security Measures [Part 2]

Comments
2 min read
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown
Cover image for Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Comments
1 min read
Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'
Cover image for Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'

Protesters accuse Google of violating its promises on AI safety: 'AI companies are less regulated than sandwich shops'

Comments
1 min read
A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'
Cover image for A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

A Pro-Russia Disinformation Campaign Is Using Free AI Tools to Fuel a ‘Content Explosion'

Comments
1 min read
loading...