DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Mastering Secure CI/CD for ECS with GitHub Actions

Mastering Secure CI/CD for ECS with GitHub Actions

1
Comments
7 min read
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
De4py: Advanced python reverse engineering

De4py: Advanced python reverse engineering

Comments
2 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

2
Comments
6 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Securing the Cloud #29

Securing the Cloud #29

Comments
3 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

Comments
3 min read
Anywho.com Review: A Comprehensive Look at the Popular People Search Site

Anywho.com Review: A Comprehensive Look at the Popular People Search Site

1
Comments 1
4 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
The Benefits of Opting Out from Using OfficialUSA.com

The Benefits of Opting Out from Using OfficialUSA.com

1
Comments 1
4 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Detect AES in ECB mode

Detect AES in ECB mode

Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

2
Comments
8 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Comments
7 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
Introducing F**kDevTools.js: Secure Your Web Applications

Introducing F**kDevTools.js: Secure Your Web Applications

2
Comments
2 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

Comments
13 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

5
Comments
9 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

3
Comments
1 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

8
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

3
Comments
2 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

4
Comments 1
2 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

2
Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
AppArmor testsuite

AppArmor testsuite

Comments
1 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

5
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

1
Comments
8 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

6
Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

Comments
2 min read
OWASP Amass

OWASP Amass

Comments
2 min read
Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

1
Comments 1
2 min read
Update! Interactive description of iptables tables

Update! Interactive description of iptables tables

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
11 API Trends to Watch for in 2024

11 API Trends to Watch for in 2024

Comments
7 min read
Configure Renovate to update preview versions of NuGet packages

Configure Renovate to update preview versions of NuGet packages

Comments
2 min read
Configure Renovate to handle nuspec files

Configure Renovate to handle nuspec files

Comments
2 min read
loading...