DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

Comments 1
4 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

4
Comments
3 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

Comments
5 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

5
Comments
9 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

18
Comments
2 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

Comments
2 min read
.NET 8.0 - JWT Token Authentication Using The Example API

.NET 8.0 - JWT Token Authentication Using The Example API

Comments
5 min read
Dev: Security

Dev: Security

Comments
3 min read
Integrating reCAPTCHA v3 in Next.js

Integrating reCAPTCHA v3 in Next.js

Comments
2 min read
Enhancing Firebase Security: How to Rotate Service Account Keys

Enhancing Firebase Security: How to Rotate Service Account Keys

Comments
1 min read
Types of Computer Security Threats

Types of Computer Security Threats

Comments
8 min read
Security news weekly round-up - 14th June 2024

Security news weekly round-up - 14th June 2024

Comments
3 min read
5 Essential Cybersecurity Tips to Secure Your Business in 2024

5 Essential Cybersecurity Tips to Secure Your Business in 2024

Comments
3 min read
Enabling Workload Identity Federation for Github Actions on GCP

Enabling Workload Identity Federation for Github Actions on GCP

Comments
1 min read
BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

Comments
5 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments
7 min read
FindAll - Automated analysis of network security emergency response tools.

FindAll - Automated analysis of network security emergency response tools.

Comments
3 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

9
Comments 1
5 min read
CodeBehind 2.7 Released, Role Access Added!

CodeBehind 2.7 Released, Role Access Added!

Comments
7 min read
Securing Firebase Connections in Next.js with HTTPS

Securing Firebase Connections in Next.js with HTTPS

Comments
2 min read
Proposal - Blockchain Coordination

Proposal - Blockchain Coordination

Comments
5 min read
Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Comments
2 min read
How to configure Server-Side Encryption (SSE-S3) in Amazon S3?

How to configure Server-Side Encryption (SSE-S3) in Amazon S3?

5
Comments
3 min read
Identifying Container Image Vulnerabilities with Docker Scout

Identifying Container Image Vulnerabilities with Docker Scout

Comments
1 min read
Fine-Grained Access Control (FGAC): Comprehensive Guidance

Fine-Grained Access Control (FGAC): Comprehensive Guidance

15
Comments
13 min read
HackTheBox - Writeup Nunchucks [Retired]

HackTheBox - Writeup Nunchucks [Retired]

1
Comments
10 min read
How AI and Machine Learning Are Revolutionizing IT Services

How AI and Machine Learning Are Revolutionizing IT Services

Comments
2 min read
The Ultimate Guide to WordPress Maintenance: Boosting Performance and Security

The Ultimate Guide to WordPress Maintenance: Boosting Performance and Security

Comments
5 min read
Use non-root user in scratch docker image

Use non-root user in scratch docker image

Comments
1 min read
ScoutSuite

ScoutSuite

Comments
2 min read
How to identify a phishing Email in 2024

How to identify a phishing Email in 2024

7
Comments
6 min read
Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Comments
8 min read
New domain OSINT tool. Your thoughts and feedback?

New domain OSINT tool. Your thoughts and feedback?

Comments
1 min read
Interoperability for Seamless Integration of Blockchain Networks

Interoperability for Seamless Integration of Blockchain Networks

Comments
4 min read
Code Integrity Unleashed: The Crucial Role of Git Signed Commits

Code Integrity Unleashed: The Crucial Role of Git Signed Commits

Comments
1 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Comments
2 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Recreating Stripe’s Roles in PropelAuth

Recreating Stripe’s Roles in PropelAuth

Comments
5 min read
Internet security through lava lamps

Internet security through lava lamps

Comments
3 min read
Java URI Library Compliant with RFC 3986

Java URI Library Compliant with RFC 3986

Comments
9 min read
Enforcing Firebase App Check for Firestore with Initialization Configuration

Enforcing Firebase App Check for Firestore with Initialization Configuration

1
Comments
2 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

4
Comments 1
1 min read
5 Auth0 Gotchas to Consider

5 Auth0 Gotchas to Consider

Comments
3 min read
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
All About Web Security

All About Web Security

Comments
3 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

Comments
10 min read
TECNO Web Security Challenge Campaign starts now

TECNO Web Security Challenge Campaign starts now

1
Comments
1 min read
Lập trình web phải phân biệt được Session và Cookie

Lập trình web phải phân biệt được Session và Cookie

Comments 1
4 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

1
Comments
2 min read
Amazon Macie to detect sensitive data from your S3 Buckets

Amazon Macie to detect sensitive data from your S3 Buckets

13
Comments
4 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

103
Comments 1
10 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
Mastering Cloudflare Ruleset Engine with Terraform

Mastering Cloudflare Ruleset Engine with Terraform

9
Comments 1
5 min read
Information Technology & Services: Streamlining Operations with Cloud Solutions

Information Technology & Services: Streamlining Operations with Cloud Solutions

Comments
2 min read
loading...