DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Use non-root user in scratch docker image

Use non-root user in scratch docker image

Comments
1 min read
Zero Trust Security: Beyond the Castle Walls

Zero Trust Security: Beyond the Castle Walls

2
Comments
11 min read
ScoutSuite

ScoutSuite

Comments
2 min read
Authentication in monorepo(NextJs, Astro) with Lucia and MongoDB

Authentication in monorepo(NextJs, Astro) with Lucia and MongoDB

Comments
12 min read
Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

3
Comments 1
1 min read
Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Comments
8 min read
New domain OSINT tool. Your thoughts and feedback?

New domain OSINT tool. Your thoughts and feedback?

Comments
1 min read
Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Interoperability for Seamless Integration of Blockchain Networks

Interoperability for Seamless Integration of Blockchain Networks

Comments
4 min read
Code Integrity Unleashed: The Crucial Role of Git Signed Commits

Code Integrity Unleashed: The Crucial Role of Git Signed Commits

Comments
1 min read
Understanding OTP SMS Bombing

Understanding OTP SMS Bombing

Comments
2 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Securing File Uploads

Securing File Uploads

Comments
5 min read
Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Comments
2 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Recreating Stripe’s Roles in PropelAuth

Recreating Stripe’s Roles in PropelAuth

Comments
5 min read
Internet security through lava lamps

Internet security through lava lamps

Comments
3 min read
Java URI Library Compliant with RFC 3986

Java URI Library Compliant with RFC 3986

Comments
9 min read
Nearly Offline Revocation Status Checks for JWT

Nearly Offline Revocation Status Checks for JWT

1
Comments
2 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
Implementing Role Based Access Control (RBAC) in Node.js and Express App

Implementing Role Based Access Control (RBAC) in Node.js and Express App

14
Comments
10 min read
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
OpenSSF Case Study: Enhancing Open Source Security with Sigstore at Stacklok

OpenSSF Case Study: Enhancing Open Source Security with Sigstore at Stacklok

2
Comments
1 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

Comments
10 min read
AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

2
Comments
15 min read
How AWS Shield Protects You From DDoS?

How AWS Shield Protects You From DDoS?

Comments
5 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

1
Comments
2 min read
Row Level Security In SQL Server

Row Level Security In SQL Server

1
Comments
3 min read
Dotenvx with Docker, the better way to manage project environment variables with secrets

Dotenvx with Docker, the better way to manage project environment variables with secrets

3
Comments
9 min read
Amazon Macie to detect sensitive data from your S3 Buckets

Amazon Macie to detect sensitive data from your S3 Buckets

13
Comments
4 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
Apple Face ID not working? Here's how to fix it

Apple Face ID not working? Here's how to fix it

1
Comments
2 min read
Securing Your Application: A Comprehensive Guide for Developers

Securing Your Application: A Comprehensive Guide for Developers

1
Comments
3 min read
Information Technology & Services: Streamlining Operations with Cloud Solutions

Information Technology & Services: Streamlining Operations with Cloud Solutions

Comments
2 min read
Be a Part of OWASP Top 10 2024!

Be a Part of OWASP Top 10 2024!

3
Comments 1
4 min read
Death of DevSecOps, Part 2

Death of DevSecOps, Part 2

1
Comments
4 min read
Enhancing Security in Web Applications with Custom Response Headers in Next.js

Enhancing Security in Web Applications with Custom Response Headers in Next.js

3
Comments
2 min read
Boost your Cloud Security with Network ACLs in your VPC

Boost your Cloud Security with Network ACLs in your VPC

Comments
3 min read
Cloud-Native Security: A Guide to Microservices and Serverless Protection

Cloud-Native Security: A Guide to Microservices and Serverless Protection

5
Comments
11 min read
BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

Comments
6 min read
Social engineering

Social engineering

26
Comments
10 min read
Step by Step Troubleshooting WAFv2 - With Pictures

Step by Step Troubleshooting WAFv2 - With Pictures

4
Comments
4 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

1
Comments
15 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

Comments
3 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

4
Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

1
Comments
3 min read
What is AWS Identity and Access Management (IAM)?

What is AWS Identity and Access Management (IAM)?

3
Comments
7 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
Security considerations of configuration management

Security considerations of configuration management

7
Comments
4 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
loading...