DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to implement JWT in Laravel API

How to implement JWT in Laravel API

Comments
4 min read
Configure Renovate to handle nuspec files

Configure Renovate to handle nuspec files

Comments
2 min read
Configure Renovate to update preview versions of NuGet packages

Configure Renovate to update preview versions of NuGet packages

Comments
2 min read
Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments
3 min read
API Keys vs. Tokens: They're Not the Same Thing!

API Keys vs. Tokens: They're Not the Same Thing!

6
Comments
3 min read
Remotely Access Your Home Assistant Instance Securely

Remotely Access Your Home Assistant Instance Securely

Comments
6 min read
Encrypting with Block Ciphers: A Guide to AES, CBC, and More

Encrypting with Block Ciphers: A Guide to AES, CBC, and More

2
Comments
6 min read
Security news weekly round-up - 3rd May 2024

Security news weekly round-up - 3rd May 2024

1
Comments
3 min read
Why IMDSv1 is a Security Risk for Cloud Infrastructure

Why IMDSv1 is a Security Risk for Cloud Infrastructure

1
Comments
4 min read
How legacy VB6 systems are endangering healthcare providers

How legacy VB6 systems are endangering healthcare providers

Comments
4 min read
AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

Comments
8 min read
Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

1
Comments
5 min read
A tale of TimescaleDB, SQLx and testing in Rust

A tale of TimescaleDB, SQLx and testing in Rust

Comments
18 min read
Access Google Cloud Secret Manager via Google Apps Script

Access Google Cloud Secret Manager via Google Apps Script

Comments
2 min read
JS Security Tip 05-01-2024 ICYMI

JS Security Tip 05-01-2024 ICYMI

Comments
1 min read
📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

1
Comments
4 min read
Issue 42 of AWS Cloud Security Weekly

Issue 42 of AWS Cloud Security Weekly

2
Comments
2 min read
Using NetBird for Kubernetes Access

Using NetBird for Kubernetes Access

Comments
11 min read
重置 Linux root 密碼

重置 Linux root 密碼

Comments
1 min read
Shared Access Signature

Shared Access Signature

2
Comments
4 min read
Brute Force Attacks and CAPTCHA

Brute Force Attacks and CAPTCHA

3
Comments
2 min read
Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

1
Comments
4 min read
The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

Comments
9 min read
Data Encryption

Data Encryption

1
Comments
2 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

Comments
11 min read
HackTheBox - Writeup Devvortex [Retired]

HackTheBox - Writeup Devvortex [Retired]

Comments
12 min read
Public IP Over VPN in Azure

Public IP Over VPN in Azure

Comments
5 min read
Enhancing Customer Workloads

Enhancing Customer Workloads

Comments
4 min read
How to get the verified badge on GitHub with SSH key signing

How to get the verified badge on GitHub with SSH key signing

1
Comments
1 min read
Secrets in Lambda Env Vars

Secrets in Lambda Env Vars

Comments
3 min read
Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Comments
6 min read
Can Artificial Intelligence Be Trusted With Our Security?

Can Artificial Intelligence Be Trusted With Our Security?

Comments
4 min read
Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Comments
3 min read
Issue 41 of AWS Cloud Security Weekly

Issue 41 of AWS Cloud Security Weekly

1
Comments
2 min read
Security news weekly round-up - 26th April 2024

Security news weekly round-up - 26th April 2024

2
Comments
3 min read
Turning Secure Access Into Child’s Play with Permit Access Request APIs

Turning Secure Access Into Child’s Play with Permit Access Request APIs

Comments
5 min read
Cors Workflow

Cors Workflow

Comments
2 min read
How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

Comments
6 min read
AWS IAM Identity Center Permission Management at Scale Part 3

AWS IAM Identity Center Permission Management at Scale Part 3

2
Comments
5 min read
Unleashing the Value of Data: A Journey into Data Monetization

Unleashing the Value of Data: A Journey into Data Monetization

1
Comments
2 min read
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

1
Comments
6 min read
For developers: you must not require needs passwords from users

For developers: you must not require needs passwords from users

10
Comments 11
4 min read
Best Practices for API Authentication and Authorization

Best Practices for API Authentication and Authorization

Comments
8 min read
What are passkeys and how do they work?

What are passkeys and how do they work?

20
Comments 1
6 min read
Securing the Cloud #27

Securing the Cloud #27

Comments
2 min read
Security news weekly round-up - 19th April 2024

Security news weekly round-up - 19th April 2024

Comments
2 min read
Protect your emails (Short note)

Protect your emails (Short note)

12
Comments 5
4 min read
Data Security and Cryptography on AWS

Data Security and Cryptography on AWS

Comments
3 min read
Securing Your Cloud: Proactive Strategies for AWS Security

Securing Your Cloud: Proactive Strategies for AWS Security

7
Comments
5 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Comments
13 min read
Your S3 objects could be public (even though the AWS Console doesn't say so)

Your S3 objects could be public (even though the AWS Console doesn't say so)

3
Comments
5 min read
Enhancing security for Lambda function URLs

Enhancing security for Lambda function URLs

2
Comments
6 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
HTTP Tools for Security Researchers and Pen Testers

HTTP Tools for Security Researchers and Pen Testers

5
Comments 4
3 min read
Optimise and Secure AWS HTTP API Gateway by locking down direct access

Optimise and Secure AWS HTTP API Gateway by locking down direct access

2
Comments
8 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
eBPF: Unleashing Kernel Magic for Modern Infrastructure

eBPF: Unleashing Kernel Magic for Modern Infrastructure

2
Comments 1
5 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

1
Comments
4 min read
US government warns against C and C++ code

US government warns against C and C++ code

Comments
4 min read
loading...