Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

Comments
1 min read
🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

Comments
2 min read
Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

10
Comments 1
2 min read
Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Securing APIs in Identity & Access Management: Best Practices for Dev Teams

Comments
4 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
Security news weekly round-up - 18th July 2025

Security news weekly round-up - 18th July 2025

1
Comments
5 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
What Are Non-Human Identities, and Why Should Security Teams Care?

What Are Non-Human Identities, and Why Should Security Teams Care?

Comments
4 min read
The Hidden Security Risk in Your NestJS App: A Validation Story

The Hidden Security Risk in Your NestJS App: A Validation Story

1
Comments
3 min read
Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center

Built for AI. Ready for Crisis. Inside Israel’s Most Secure Data Center

Comments
2 min read
Top 10 Web Application Penetration Testing Tools

Top 10 Web Application Penetration Testing Tools

1
Comments
9 min read
Provide shared file storage for the company offices

Provide shared file storage for the company offices

Comments
5 min read
Level Up Your NGINX Skills with These 6 Configurations

Level Up Your NGINX Skills with These 6 Configurations

3
Comments
4 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
Snowflake

Snowflake

Comments
1 min read
Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Grok will no longer call itself Hitler or base its opinions on Elon Musk's, promises xAI

Comments
1 min read
Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Best practice for building an e-commerce system with React Native, Django Admin, and FastAPI

Comments
1 min read
Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Comments
3 min read
NYT to start searching deleted ChatGPT logs after beating OpenAI in court

NYT to start searching deleted ChatGPT logs after beating OpenAI in court

3
Comments
1 min read
Cybr - Beginner's Guide to AWS CloudTrail for Security

Cybr - Beginner's Guide to AWS CloudTrail for Security

Comments
1 min read
A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

5
Comments
4 min read
Elon Musk's AI chatbot churns out antisemitic posts days after update

Elon Musk's AI chatbot churns out antisemitic posts days after update

Comments
1 min read
How to Restrict WordPress Admin Access by IP Address

How to Restrict WordPress Admin Access by IP Address

Comments
6 min read
Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Cloudots: Cloud security telemetry knowledge-base dedicated to cloud logs

Comments
1 min read
loading...