Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad
Cover image for Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Módulo 3 — Identidades Digitales Derivadas e Interoperabilidad

Comments
4 min read
Android Kiosk Mode Explained in Simple Steps
Cover image for Android Kiosk Mode Explained in Simple Steps

Android Kiosk Mode Explained in Simple Steps

Comments
5 min read
📰 Major Tech News: September 28, 2025
Cover image for 📰 Major Tech News: September 28, 2025

📰 Major Tech News: September 28, 2025

20
Comments 2
5 min read
Outil de Cybersécurité du Jour - Aug 28, 2025

Outil de Cybersécurité du Jour - Aug 28, 2025

1
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 20, 2025

Outil de Cybersécurité du Jour - Sep 20, 2025

1
Comments
3 min read
Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security
Cover image for Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security

Building Own Block Cipher: Part 1 - Lego Bricks of Modern Security

1
Comments
9 min read
AWS IAM POLICIES Deep Dive
Cover image for AWS IAM POLICIES Deep Dive

AWS IAM POLICIES Deep Dive

1
Comments
4 min read
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together
Cover image for OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

Comments
7 min read
Testing MCP Servers: Exploring Prompt Injection and Security Risks
Cover image for Testing MCP Servers: Exploring Prompt Injection and Security Risks

Testing MCP Servers: Exploring Prompt Injection and Security Risks

15
Comments 3
2 min read
Secure Your Spring API With JWT and MongoDB
Cover image for Secure Your Spring API With JWT and MongoDB

Secure Your Spring API With JWT and MongoDB

11
Comments 2
13 min read
Dotenv files annoyed me into writing Polyenv

Dotenv files annoyed me into writing Polyenv

4
Comments 1
7 min read
Securely Send SMS with Twilio, AWS Lambda, and Terraform

Securely Send SMS with Twilio, AWS Lambda, and Terraform

1
Comments
4 min read
DOM-based XSS in-depth

DOM-based XSS in-depth

1
Comments 1
6 min read
How to create an AWS IAM EKS Cluster role to be used later

How to create an AWS IAM EKS Cluster role to be used later

Comments
1 min read
Create secure tunnels between Upsun projects with Chisel
Cover image for Create secure tunnels between Upsun projects with Chisel

Create secure tunnels between Upsun projects with Chisel

Comments
1 min read
The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

1
Comments
2 min read
Connections and workflows updates in September

Connections and workflows updates in September

6
Comments
1 min read
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

Comments
4 min read
Outil de Cybersécurité du Jour - Aug 27, 2025

Outil de Cybersécurité du Jour - Aug 27, 2025

Comments
3 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Essential JWT Security Best Practices for Developers
Cover image for Essential JWT Security Best Practices for Developers

Essential JWT Security Best Practices for Developers

19
Comments 6
6 min read
The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite
Cover image for The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

1
Comments
10 min read
Agentic AI in Cybersecurity: The Next Frontier for Human-Centric Defense

Agentic AI in Cybersecurity: The Next Frontier for Human-Centric Defense

Comments
3 min read
Mastering Identity Management in Microsoft Entra ID: From Users to Roles
Cover image for Mastering Identity Management in Microsoft Entra ID: From Users to Roles

Mastering Identity Management in Microsoft Entra ID: From Users to Roles

6
Comments
3 min read
How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

1
Comments 1
3 min read
loading...