Forem

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Zero-Trust Architecture in Node.js Applications
Cover image for Implementing Zero-Trust Architecture in Node.js Applications

Implementing Zero-Trust Architecture in Node.js Applications

4
Comments 1
2 min read
React Security Patterns Every Developer Should Know
Cover image for React Security Patterns Every Developer Should Know

React Security Patterns Every Developer Should Know

4
Comments 2
2 min read
Data Privacy and Vibe Coding

Data Privacy and Vibe Coding

Comments
1 min read
IntelHub โ€” local-first OSINT toolkit for your browser (open source)

IntelHub โ€” local-first OSINT toolkit for your browser (open source)

1
Comments
1 min read
ETL: The Unsung Hero of Data-Driven Decisions
Cover image for ETL: The Unsung Hero of Data-Driven Decisions

ETL: The Unsung Hero of Data-Driven Decisions

2
Comments
3 min read
Exploring zkTLS As A Way To Build A Verifiable and Private Web3

Exploring zkTLS As A Way To Build A Verifiable and Private Web3

5
Comments 5
4 min read
Introducing AIWAF: An AI-Powered Web Application Firewall for Django and Flask

Introducing AIWAF: An AI-Powered Web Application Firewall for Django and Flask

Comments
1 min read
๐Ÿ“ฐ Major Tech News: September 19, 2025
Cover image for ๐Ÿ“ฐ Major Tech News: September 19, 2025

๐Ÿ“ฐ Major Tech News: September 19, 2025

27
Comments 6
4 min read
Understand security, scalability and decentralization in Blockchain

Understand security, scalability and decentralization in Blockchain

1
Comments 1
2 min read
Microservices Security: From Fundamentals to Advanced Patterns
Cover image for Microservices Security: From Fundamentals to Advanced Patterns

Microservices Security: From Fundamentals to Advanced Patterns

6
Comments
21 min read
Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

Beyond the Firewall: Why Every Developer Needs an Adversarial Mindset

1
Comments
4 min read
๐Ÿ”’ VoIP Security 101
Cover image for ๐Ÿ”’ VoIP Security 101

๐Ÿ”’ VoIP Security 101

Comments
3 min read
Fixing Bluetooth Issues in Kali Linux

Fixing Bluetooth Issues in Kali Linux

Comments
1 min read
Converting IAM Users to Roles: A Complete Web-Based Solution

Converting IAM Users to Roles: A Complete Web-Based Solution

1
Comments 1
3 min read
Security news weekly round-up - 19th September 2025
Cover image for Security news weekly round-up - 19th September 2025

Security news weekly round-up - 19th September 2025

1
Comments
3 min read
The Ultimate Checklist for Building a Secure Docker CI/CD Pipeline

The Ultimate Checklist for Building a Secure Docker CI/CD Pipeline

Comments
3 min read
Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection
Cover image for Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection

Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection

1
Comments 1
5 min read
Security Hardening for Nginx: TLS, Firewalls, and Fail2Ban Basics

Security Hardening for Nginx: TLS, Firewalls, and Fail2Ban Basics

Comments
4 min read
Hardening a Vercel app: CSP, CORS, and Service Workers that donโ€™t bite
Cover image for Hardening a Vercel app: CSP, CORS, and Service Workers that donโ€™t bite

Hardening a Vercel app: CSP, CORS, and Service Workers that donโ€™t bite

Comments
3 min read
Fintech Security: Best Practices for Fintech Apps
Cover image for Fintech Security: Best Practices for Fintech Apps

Fintech Security: Best Practices for Fintech Apps

21
Comments 1
8 min read
Business Software with AI?
Cover image for Business Software with AI?

Business Software with AI?

Comments
1 min read
The Ultimate Checklist for Securing DNS Records & Email Auth

The Ultimate Checklist for Securing DNS Records & Email Auth

Comments
3 min read
Building My Homelab: The Easiest Way to SSH Remotely

Building My Homelab: The Easiest Way to SSH Remotely

1
Comments
4 min read
Secure Remote Access with AWS Verified Access

Secure Remote Access with AWS Verified Access

3
Comments
3 min read
"Trust" - The Key To Agent-Agent Communication

"Trust" - The Key To Agent-Agent Communication

Comments
3 min read
loading...