DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

Comments
9 min read
Why Understanding Your Open Source Licenses Matters

Why Understanding Your Open Source Licenses Matters

6
Comments
6 min read
Data Encryption

Data Encryption

Comments
2 min read
Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

1
Comments
5 min read
A tale of TimescaleDB, SQLx and testing in Rust

A tale of TimescaleDB, SQLx and testing in Rust

Comments
18 min read
Securing Your Cloud: Proactive Strategies for AWS Security

Securing Your Cloud: Proactive Strategies for AWS Security

5
Comments
5 min read
Access Google Cloud Secret Manager via Google Apps Script

Access Google Cloud Secret Manager via Google Apps Script

Comments
2 min read
JS Security Tip 05-01-2024 ICYMI

JS Security Tip 05-01-2024 ICYMI

Comments
1 min read
📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

📌 AWS Under the Hood - Day 10 - How to Revoke Temporary IAM Credentials if they are Exposed 📌

1
Comments
4 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

4
Comments
2 min read
Issue 42 of AWS Cloud Security Weekly

Issue 42 of AWS Cloud Security Weekly

2
Comments
2 min read
Using NetBird for Kubernetes Access

Using NetBird for Kubernetes Access

Comments
11 min read
Shared Access Signature

Shared Access Signature

2
Comments
4 min read
Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

Navigating Early Career Hurdles: Security (Keeping User Data Safe as a Frontend Engineer)

1
Comments
4 min read
Password Management: The Basics

Password Management: The Basics

5
Comments 2
10 min read
Your S3 objects could be public (even though the AWS Console doesn't say so)

Your S3 objects could be public (even though the AWS Console doesn't say so)

2
Comments
5 min read
Enhancing security for Lambda function URLs

Enhancing security for Lambda function URLs

2
Comments
6 min read
HackTheBox - Writeup Builder [Retired]

HackTheBox - Writeup Builder [Retired]

Comments
11 min read
HackTheBox - Writeup Devvortex [Retired]

HackTheBox - Writeup Devvortex [Retired]

Comments
12 min read
Public IP Over VPN in Azure

Public IP Over VPN in Azure

Comments
5 min read
Optimise and Secure AWS HTTP API Gateway by locking down direct access

Optimise and Secure AWS HTTP API Gateway by locking down direct access

2
Comments
8 min read
Enhancing Customer Workloads

Enhancing Customer Workloads

Comments
4 min read
How to get the verified badge on GitHub with SSH key signing

How to get the verified badge on GitHub with SSH key signing

1
Comments
1 min read
Securing Self-Hosted Services with CF Tunnel Gate

Securing Self-Hosted Services with CF Tunnel Gate

Comments
5 min read
Secrets in Lambda Env Vars

Secrets in Lambda Env Vars

Comments
3 min read
Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Importance of Security Groups (SGs) and Network Access Control Lists (NACLs) in AWS

Comments
6 min read
Can Artificial Intelligence Be Trusted With Our Security?

Can Artificial Intelligence Be Trusted With Our Security?

Comments
4 min read
Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Securing Your Site: Obtain an SSL Certificate with Let’s Encrypt When Your ISP Blocks Port 80

Comments
3 min read
Issue 41 of AWS Cloud Security Weekly

Issue 41 of AWS Cloud Security Weekly

1
Comments
2 min read
Security news weekly round-up - 26th April 2024

Security news weekly round-up - 26th April 2024

2
Comments
3 min read
Turning Secure Access Into Child’s Play with Permit Access Request APIs

Turning Secure Access Into Child’s Play with Permit Access Request APIs

Comments
5 min read
Cors Workflow

Cors Workflow

Comments
2 min read
How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

Comments
6 min read
AWS IAM Identity Center Permission Management at Scale Part 3

AWS IAM Identity Center Permission Management at Scale Part 3

2
Comments
5 min read
Unleashing the Value of Data: A Journey into Data Monetization

Unleashing the Value of Data: A Journey into Data Monetization

1
Comments
2 min read
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

1
Comments
6 min read
Best Practices for API Authentication and Authorization

Best Practices for API Authentication and Authorization

Comments
8 min read
Securing the Cloud #27

Securing the Cloud #27

Comments
2 min read
Security news weekly round-up - 19th April 2024

Security news weekly round-up - 19th April 2024

Comments
2 min read
Data Security and Cryptography on AWS

Data Security and Cryptography on AWS

Comments
3 min read
Protect your emails (Short note)

Protect your emails (Short note)

11
Comments 5
4 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Comments
13 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
HTTP Tools for Security Researchers and Pen Testers

HTTP Tools for Security Researchers and Pen Testers

5
Comments 4
3 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
eBPF: Unleashing Kernel Magic for Modern Infrastructure

eBPF: Unleashing Kernel Magic for Modern Infrastructure

2
Comments 1
5 min read
Snyk CLI: Introducing Semantic Versioning and release channels

Snyk CLI: Introducing Semantic Versioning and release channels

1
Comments
4 min read
US government warns against C and C++ code

US government warns against C and C++ code

Comments
4 min read
Enhance Security for NodeJS Applications

Enhance Security for NodeJS Applications

Comments
5 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 6
4 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
AWS Detective

AWS Detective

Comments
2 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
keepsecret.py: a simple way to encrypt secret files in your repository

keepsecret.py: a simple way to encrypt secret files in your repository

1
Comments
4 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
loading...