Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

Docker Series: Episode 20 — Docker Security Best Practices & Secrets Management 🔒

7
Comments
2 min read
Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)
Cover image for Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Self-host Uptime Kuma with Docker in 5 minutes (+ TLS-expiry alerts)

Comments
2 min read
What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

What Blockchain Actually Brings to Cyber Defense (And What It Doesn’t)

3
Comments 2
4 min read
Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Mastering Web Fundamentals: Top Interview Questions and Answers (HTTP, TLS, Security, Performance)

Comments
4 min read
Stronger iPhone Security for Crypto Transactions
Cover image for Stronger iPhone Security for Crypto Transactions

Stronger iPhone Security for Crypto Transactions

6
Comments
1 min read
IAM POLICIES
Cover image for IAM POLICIES

IAM POLICIES

1
Comments
3 min read
🔐 End-to-End File Encryption with AES and Integrity Checks
Cover image for 🔐 End-to-End File Encryption with AES and Integrity Checks

🔐 End-to-End File Encryption with AES and Integrity Checks

Comments
5 min read
The Dangers of JWT Decoding on the Frontend: What You Need to Know

The Dangers of JWT Decoding on the Frontend: What You Need to Know

Comments
1 min read
Post-Cookie Web: Building Privacy-First Analytics That Actually Work
Cover image for Post-Cookie Web: Building Privacy-First Analytics That Actually Work

Post-Cookie Web: Building Privacy-First Analytics That Actually Work

17
Comments
4 min read
🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense

🛡 CrowdSec: Open‑Source, Crowd‑Powered Defense

2
Comments
1 min read
SOC 2 for Engineers: What It Is and Why Your Terrible Tagging Strategy Is an Audit Failure Waiting to Happen

SOC 2 for Engineers: What It Is and Why Your Terrible Tagging Strategy Is an Audit Failure Waiting to Happen

Comments
5 min read
How to Discover and Protect Sensitive Data Using CLI and SQL Tools
Cover image for How to Discover and Protect Sensitive Data Using CLI and SQL Tools

How to Discover and Protect Sensitive Data Using CLI and SQL Tools

Comments
2 min read
Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad
Cover image for Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Comments
4 min read
Android Kiosk Mode Explained in Simple Steps
Cover image for Android Kiosk Mode Explained in Simple Steps

Android Kiosk Mode Explained in Simple Steps

Comments
5 min read
📰 Major Tech News: September 28, 2025
Cover image for 📰 Major Tech News: September 28, 2025

📰 Major Tech News: September 28, 2025

20
Comments 2
5 min read
Outil de Cybersécurité du Jour - Aug 28, 2025

Outil de Cybersécurité du Jour - Aug 28, 2025

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 20, 2025

Outil de Cybersécurité du Jour - Sep 20, 2025

1
Comments
3 min read
Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security
Cover image for Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security

Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security

1
Comments
9 min read
AWS IAM POLICIES Deep Dive
Cover image for AWS IAM POLICIES Deep Dive

AWS IAM POLICIES Deep Dive

1
Comments
4 min read
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together
Cover image for OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Comments
7 min read
Testing MCP Servers: Exploring Prompt Injection and Security Risks
Cover image for Testing MCP Servers: Exploring Prompt Injection and Security Risks

Testing MCP Servers: Exploring Prompt Injection and Security Risks

15
Comments 3
2 min read
Secure Your Spring API With JWT and MongoDB
Cover image for Secure Your Spring API With JWT and MongoDB

Secure Your Spring API With JWT and MongoDB

11
Comments 2
13 min read
Securely Send SMS with Twilio, AWS Lambda, and Terraform

Securely Send SMS with Twilio, AWS Lambda, and Terraform

1
Comments
4 min read
Dotenv files annoyed me into writing Polyenv

Dotenv files annoyed me into writing Polyenv

4
Comments 1
7 min read
DOM-based XSS in-depth

DOM-based XSS in-depth

1
Comments 1
6 min read
loading...