Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding CSRF Attacks: Process, Risks, and Protection

Understanding CSRF Attacks: Process, Risks, and Protection

Comments
4 min read
I rolled my own auth

I rolled my own auth

4
Comments 2
1 min read
Windows Device Management: Streamline Your IT Operations
Cover image for Windows Device Management: Streamline Your IT Operations

Windows Device Management: Streamline Your IT Operations

Comments
5 min read
SSH Authentication Key Rotation: Why and How to Expire SSH Keys
Cover image for SSH Authentication Key Rotation: Why and How to Expire SSH Keys

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

8
Comments
4 min read
The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)
Cover image for The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

11
Comments 2
3 min read
Outtake: Revolutionizing Threat Detection with GPT-4.1
Cover image for Outtake: Revolutionizing Threat Detection with GPT-4.1

Outtake: Revolutionizing Threat Detection with GPT-4.1

Comments 1
3 min read
CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025
Cover image for CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

1
Comments
1 min read
Authenticate GitHub Actions to Azure using OpenID Connect

Authenticate GitHub Actions to Azure using OpenID Connect

1
Comments
4 min read
Startup Life: From DevOps to Filling Out Compliance Spreadsheets

Startup Life: From DevOps to Filling Out Compliance Spreadsheets

1
Comments
3 min read
Secure Your Spring Boot API with JWT and Role-Based Authorization

Secure Your Spring Boot API with JWT and Role-Based Authorization

Comments
5 min read
Terraforming the Cloud
Cover image for Terraforming the Cloud

Terraforming the Cloud

16
Comments 13
2 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization
Cover image for 🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
Creating a Kinde workflow to check for malicious IPs during authentication
Cover image for Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
OpenID: A Comprehensive Guide to Secure Online Authentication
Cover image for OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.
Cover image for ⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

10
Comments 5
1 min read
🔐 Secure Web Application Flow with JWT: From Frontend to Backend

🔐 Secure Web Application Flow with JWT: From Frontend to Backend

Comments
2 min read
Managing Service Accounts in Multicluster Environments with RHACM
Cover image for Managing Service Accounts in Multicluster Environments with RHACM

Managing Service Accounts in Multicluster Environments with RHACM

Comments
7 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)
Cover image for How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
Using chroot to Restrict Linux Applications for Enhanced Security
Cover image for Using chroot to Restrict Linux Applications for Enhanced Security

Using chroot to Restrict Linux Applications for Enhanced Security

1
Comments
4 min read
How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

Comments
1 min read
AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

Comments
3 min read
Assessing Security Risks of Open Source Repos

Assessing Security Risks of Open Source Repos

Comments
2 min read
loading...