Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Converting IAM Users to Roles: A Complete Web-Based Solution

Converting IAM Users to Roles: A Complete Web-Based Solution

1
Comments 1
3 min read
Security news weekly round-up - 19th September 2025
Cover image for Security news weekly round-up - 19th September 2025

Security news weekly round-up - 19th September 2025

1
Comments
3 min read
The Ultimate Checklist for Building a Secure Docker CI/CD Pipeline

The Ultimate Checklist for Building a Secure Docker CI/CD Pipeline

Comments
3 min read
Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection
Cover image for Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection

Comprehensive Terraform State Security: MyCoCo's Journey from Public Exposure to Layered Protection

1
Comments 1
5 min read
Security Hardening for Nginx: TLS, Firewalls, and Fail2Ban Basics

Security Hardening for Nginx: TLS, Firewalls, and Fail2Ban Basics

Comments
4 min read
Hardening a Vercel app: CSP, CORS, and Service Workers that don’t bite
Cover image for Hardening a Vercel app: CSP, CORS, and Service Workers that don’t bite

Hardening a Vercel app: CSP, CORS, and Service Workers that don’t bite

Comments
3 min read
Fintech Security: Best Practices for Fintech Apps
Cover image for Fintech Security: Best Practices for Fintech Apps

Fintech Security: Best Practices for Fintech Apps

21
Comments 1
8 min read
Business Software with AI?
Cover image for Business Software with AI?

Business Software with AI?

Comments
1 min read
The Ultimate Checklist for Securing DNS Records & Email Auth

The Ultimate Checklist for Securing DNS Records & Email Auth

Comments
3 min read
Building My Homelab: The Easiest Way to SSH Remotely

Building My Homelab: The Easiest Way to SSH Remotely

1
Comments
4 min read
Secure Remote Access with AWS Verified Access

Secure Remote Access with AWS Verified Access

3
Comments
3 min read
"Trust" - The Key To Agent-Agent Communication

"Trust" - The Key To Agent-Agent Communication

Comments
3 min read
Why Ephemeral Resources in Terraform Matter: How MyCoCo Eliminated Secrets from State Files
Cover image for Why Ephemeral Resources in Terraform Matter: How MyCoCo Eliminated Secrets from State Files

Why Ephemeral Resources in Terraform Matter: How MyCoCo Eliminated Secrets from State Files

1
Comments
4 min read
Shai-Hulud: a self-propagating npm worm hits @ctrl/tinycolor and dozens more packages

Shai-Hulud: a self-propagating npm worm hits @ctrl/tinycolor and dozens more packages

2
Comments
2 min read
⚡ Mastering Java Exceptions: From Beginner to Bug-Slayer 🚀
Cover image for ⚡ Mastering Java Exceptions: From Beginner to Bug-Slayer 🚀

⚡ Mastering Java Exceptions: From Beginner to Bug-Slayer 🚀

1
Comments
3 min read
Firewalld: The Modern Firewall Manager
Cover image for Firewalld: The Modern Firewall Manager

Firewalld: The Modern Firewall Manager

Comments
4 min read
Threat Modelling with Threat Dragon
Cover image for Threat Modelling with Threat Dragon

Threat Modelling with Threat Dragon

Comments
7 min read
OIDC: The Web's Universal Passport for Secure Logins
Cover image for OIDC: The Web's Universal Passport for Secure Logins

OIDC: The Web's Universal Passport for Secure Logins

1
Comments
4 min read
The Dangerous Comfort of the Checkbox: Why Compliance is Not Security

The Dangerous Comfort of the Checkbox: Why Compliance is Not Security

1
Comments
4 min read
Facing the Shai-Hulud Worm: Where the Hell is Easystreet?

Facing the Shai-Hulud Worm: Where the Hell is Easystreet?

16
Comments 4
6 min read
The Ultimate Checklist for Securing Your DNS Records Across Cloudflare

The Ultimate Checklist for Securing Your DNS Records Across Cloudflare

1
Comments
3 min read
Shifting Security Left: Why DevSecOps is Not Optional Anymore

Shifting Security Left: Why DevSecOps is Not Optional Anymore

1
Comments
3 min read
Examining the impact of npm supply chain attacks on MCP

Examining the impact of npm supply chain attacks on MCP

5
Comments
3 min read
Protecting our EKS Nodes with Wazuh
Cover image for Protecting our EKS Nodes with Wazuh

Protecting our EKS Nodes with Wazuh

38
Comments
7 min read
Security Principles
Cover image for Security Principles

Security Principles

Comments
11 min read
loading...