Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Deploy to Azure with Least Privilege

How to Deploy to Azure with Least Privilege

22
Comments 5
13 min read
Threat Modeling — Step by Step
Cover image for Threat Modeling — Step by Step

Threat Modeling — Step by Step

9
Comments 2
4 min read
Low-Hanging Fruits of Web Security
Cover image for Low-Hanging Fruits of Web Security

Low-Hanging Fruits of Web Security

47
Comments 2
3 min read
Cleanup your Azure DevOps Service Principals
Cover image for Cleanup your Azure DevOps Service Principals

Cleanup your Azure DevOps Service Principals

14
Comments
4 min read
Introduction to AWS and AWS Compute Services
Cover image for Introduction to AWS and AWS Compute Services

Introduction to AWS and AWS Compute Services

11
Comments 5
14 min read
Bandit CTF - 1 to 5 Challenges WriteUp
Cover image for Bandit CTF - 1 to 5 Challenges WriteUp

Bandit CTF - 1 to 5 Challenges WriteUp

6
Comments
2 min read
Understanding Unikernels: The Future of Cloud Computing, Probably
Cover image for Understanding Unikernels: The Future of Cloud Computing, Probably

Understanding Unikernels: The Future of Cloud Computing, Probably

22
Comments
7 min read
Keep Your Javascript Projects Secure With Snyk
Cover image for Keep Your Javascript Projects Secure With Snyk

Keep Your Javascript Projects Secure With Snyk

22
Comments 4
3 min read
Implementing End to End Encryption in your Cross Platform App
Cover image for Implementing End to End Encryption in your Cross Platform App

Implementing End to End Encryption in your Cross Platform App

12
Comments
3 min read
Authentication vs. Authorization
Cover image for Authentication vs. Authorization

Authentication vs. Authorization

161
Comments 4
2 min read
Secure Cookies in 5 steps

Secure Cookies in 5 steps

14
Comments
2 min read
Do you know what open source dependencies your teams are using?
Cover image for Do you know what open source dependencies your teams are using?

Do you know what open source dependencies your teams are using?

7
Comments 3
4 min read
Crypto-mining attack in my GitHub actions through Pull Request
Cover image for Crypto-mining attack in my GitHub actions through Pull Request

Crypto-mining attack in my GitHub actions through Pull Request

45
Comments 20
8 min read
Top 10 Extensions You Must Use For Your Privacy

Top 10 Extensions You Must Use For Your Privacy

9
Comments
6 min read
Modernize your legacy API authentication with Microsoft.Identity.Web and Azure AD

Modernize your legacy API authentication with Microsoft.Identity.Web and Azure AD

11
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.