Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Auto OpenVPN reconnect and killswitch for VPNs with dynamic IPs

Auto OpenVPN reconnect and killswitch for VPNs with dynamic IPs

3
Comments
4 min read
Managing Secrets with Doppler in Django

Managing Secrets with Doppler in Django

11
Comments
4 min read
Five Benefits of Open Source Software for Your Organization

Five Benefits of Open Source Software for Your Organization

8
Comments 2
5 min read
Saving Netlify App Secrets using Doppler

Saving Netlify App Secrets using Doppler

3
Comments
6 min read
SĂ©rie Nginx 6#: Controlando acesso

SĂ©rie Nginx 6#: Controlando acesso

10
Comments
5 min read
Playfair Cipher Encryption Program In Python

Playfair Cipher Encryption Program In Python

8
Comments 2
2 min read
What is Playfair Cipher Encryption Algorithm

What is Playfair Cipher Encryption Algorithm

16
Comments 5
4 min read
Understand the TLS Handshake

Understand the TLS Handshake

4
Comments
1 min read
How to ensure the highest quality of Software code

How to ensure the highest quality of Software code

60
Comments 11
3 min read
How to Secure Containers with Cosign and Distroless Images

How to Secure Containers with Cosign and Distroless Images

3
Comments
6 min read
History and Rise of "Passwordless"

History and Rise of "Passwordless"

3
Comments
3 min read
Passwordless 101

Passwordless 101

2
Comments
4 min read
AzureFunBytes Episode 58 - Improve your Open Source Security with @WhiteSourceSoft

AzureFunBytes Episode 58 - Improve your Open Source Security with @WhiteSourceSoft

7
Comments
3 min read
password management with pass and git

password management with pass and git

3
Comments
2 min read
How to Protect Your Online Privacy with a VPN

How to Protect Your Online Privacy with a VPN

2
Comments
3 min read
How to get a YubiKey credential for shell scripts

How to get a YubiKey credential for shell scripts

6
Comments 3
1 min read
The End of Dawn - “Let's Encrypt” certificate expiration.

The End of Dawn - “Let's Encrypt” certificate expiration.

22
Comments 1
3 min read
Malware Scanning on the Puppet Forge

Malware Scanning on the Puppet Forge

3
Comments
5 min read
Using Doppler In a React-Firebase Application

Using Doppler In a React-Firebase Application

7
Comments 1
4 min read
Google No Longer Values Our Privacy and Security

Google No Longer Values Our Privacy and Security

5
Comments 2
3 min read
Kubernetes: Helm  - "x509: certificate signed by unknown authority", and ServiceAccount for Pod

Kubernetes: Helm  - "x509: certificate signed by unknown authority", and ServiceAccount for Pod

6
Comments
6 min read
Protect Your Routes in React

Protect Your Routes in React

11
Comments
2 min read
DevSecOps notes!

DevSecOps notes!

14
Comments
3 min read
Facebook and Google Authentication with Node.js and Doppler

Facebook and Google Authentication with Node.js and Doppler

15
Comments
8 min read
100 days of hacking

100 days of hacking

5
Comments
2 min read
TryHackMe - Classic Passwd Writeup

TryHackMe - Classic Passwd Writeup

4
Comments
3 min read
Starting in Ethical Hacking

Starting in Ethical Hacking

7
Comments
2 min read
What are HTTP Security Headers and how to config them?

What are HTTP Security Headers and how to config them?

28
Comments 2
7 min read
How browsers handle authentication?

How browsers handle authentication?

24
Comments
3 min read
TIL: How to set security headers for Gatsby Develop

TIL: How to set security headers for Gatsby Develop

13
Comments 5
2 min read
Preventing XSS in .NET Core Web Apis

Preventing XSS in .NET Core Web Apis

3
Comments
5 min read
Deployment Web Security Checklist | Secure your Django App and Apache Server

Deployment Web Security Checklist | Secure your Django App and Apache Server

21
Comments
8 min read
A good way to set up SSH keys for Git on Macbooks

A good way to set up SSH keys for Git on Macbooks

18
Comments 1
2 min read
Top 10 Common Types of Cyber Security Attacks

Top 10 Common Types of Cyber Security Attacks

18
Comments 3
5 min read
✅INCREASE the Security of your .NET Applications 🏅(5 Tips to follow RIGHT NOW)

✅INCREASE the Security of your .NET Applications 🏅(5 Tips to follow RIGHT NOW)

33
Comments 10
4 min read
Security news weekly round-up - 24th September 2021

Security news weekly round-up - 24th September 2021

2
Comments
4 min read
Password Security in 2022 - What you need to know

Password Security in 2022 - What you need to know

3
Comments
8 min read
Configura AutoFirma con el DNIe en Ubuntu Linux

Configura AutoFirma con el DNIe en Ubuntu Linux

5
Comments
3 min read
Securing access to S3 bucket

Securing access to S3 bucket

11
Comments
9 min read
OWASP Top 10 Vulnerabilities

OWASP Top 10 Vulnerabilities

2
Comments
2 min read
SQL Injection Attacks and How Developers Can Prevent Them

SQL Injection Attacks and How Developers Can Prevent Them

35
Comments 2
7 min read
How Catawiki Migrated SSO’s with Zero Trust and Zero Downtime

How Catawiki Migrated SSO’s with Zero Trust and Zero Downtime

12
Comments
4 min read
Session management: What it is and why your security depends on it

Session management: What it is and why your security depends on it

1
Comments
4 min read
WAF Managed Rules updates Slack Notification

WAF Managed Rules updates Slack Notification

7
Comments
2 min read
TryHackMe - Dunkle Materie Writeup

TryHackMe - Dunkle Materie Writeup

4
Comments
5 min read
GitLab DevSecOps Report 2021 - Proactively prevent vulnerabilities

GitLab DevSecOps Report 2021 - Proactively prevent vulnerabilities

2
Comments
4 min read
How CSRF Token protects your web application

How CSRF Token protects your web application

4
Comments
3 min read
A Need For Blockchain Testing

A Need For Blockchain Testing

7
Comments
4 min read
Group-based auth with AppSync Lambda authoriser

Group-based auth with AppSync Lambda authoriser

5
Comments
4 min read
How to Install Kali Linux on VirtualBox: A Step-by-Step Guide

How to Install Kali Linux on VirtualBox: A Step-by-Step Guide

11
Comments
4 min read
Introduction to Cybersecurity Tools & Cyber Attacks

Introduction to Cybersecurity Tools & Cyber Attacks

26
Comments 1
6 min read
Secure API Keys on the Frontend - Vue JS

Secure API Keys on the Frontend - Vue JS

30
Comments 6
4 min read
Integrate APIs with your HTML Site without a Backend.

Integrate APIs with your HTML Site without a Backend.

11
Comments
3 min read
Network Security & Database Vulnerabilities

Network Security & Database Vulnerabilities

3
Comments
8 min read
How to list Azure VM potentially affected by the OMI RCE

How to list Azure VM potentially affected by the OMI RCE

4
Comments 1
1 min read
Database testing: why and how to perform unit testing

Database testing: why and how to perform unit testing

5
Comments
7 min read
Firestore Counters - Everything There is to Know!

Firestore Counters - Everything There is to Know!

6
Comments
7 min read
Using password_hash to Hash and Store Passwords in PHP

Using password_hash to Hash and Store Passwords in PHP

6
Comments
2 min read
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple

6
Comments
4 min read
Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

Don’t underestimate the value of a secure, seamless ‘forgot password’ flow

2
Comments
4 min read
loading...