Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Comments
4 min read
Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide
Cover image for Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

6
Comments
3 min read
Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later
Cover image for Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

2
Comments
3 min read
Building an Enterprise Data Access Layer: The Foundation
Cover image for Building an Enterprise Data Access Layer: The Foundation

Building an Enterprise Data Access Layer: The Foundation

2
Comments
2 min read
Introducing SecureCheck: An Open-Source Security Scanner for Web Applications
Cover image for Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Comments
2 min read
Module 2 — Derived Identities and Secure Export
Cover image for Module 2 — Derived Identities and Secure Export

Module 2 — Derived Identities and Secure Export

1
Comments
4 min read
Linus Tech Tips (LTT): I Gave Him an IMPOSSIBLE Task

Linus Tech Tips (LTT): I Gave Him an IMPOSSIBLE Task

Comments
1 min read
How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers
Cover image for How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

Comments
2 min read
How to Maintain Compliance and Security in Finance
Cover image for How to Maintain Compliance and Security in Finance

How to Maintain Compliance and Security in Finance

Comments
2 min read
Day 44 of Data analytics journey !
Cover image for Day 44 of Data analytics journey !

Day 44 of Data analytics journey !

1
Comments
2 min read
🛡️ Content Security Policy (CSP): A Complete Guide for Developers
Cover image for 🛡️ Content Security Policy (CSP): A Complete Guide for Developers

🛡️ Content Security Policy (CSP): A Complete Guide for Developers

2
Comments
3 min read
Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)
Cover image for Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

2
Comments
4 min read
Understanding HOTP and TOTP in Two-Factor Authentication 10:35

Understanding HOTP and TOTP in Two-Factor Authentication

1
Comments
3 min read
HashGate - HMAC Authentication Implementation

HashGate - HMAC Authentication Implementation

Comments
7 min read
Build an Email OTP Verification System in Node.js (Step-by-Step)
Cover image for Build an Email OTP Verification System in Node.js (Step-by-Step)

Build an Email OTP Verification System in Node.js (Step-by-Step)

1
Comments
11 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Comments
2 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)
Cover image for Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
The Hidden Dangers of Overlooking Digital Hygiene in 2025
Cover image for The Hidden Dangers of Overlooking Digital Hygiene in 2025

The Hidden Dangers of Overlooking Digital Hygiene in 2025

1
Comments
2 min read
What is Customer Identity and Access Management? Benefits and Examples
Cover image for What is Customer Identity and Access Management? Benefits and Examples

What is Customer Identity and Access Management? Benefits and Examples

1
Comments
2 min read
Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Comments
2 min read
Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions
Cover image for Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

1
Comments
2 min read
📰 Major Tech News: September 27, 2025
Cover image for 📰 Major Tech News: September 27, 2025

📰 Major Tech News: September 27, 2025

21
Comments
5 min read
loading...