DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Comments
4 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Comments
3 min read
Identity Management: The Foundation for Security Implementation

Identity Management: The Foundation for Security Implementation

7
Comments 1
5 min read
How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
7 firewall management best practices in 2024

7 firewall management best practices in 2024

Comments
4 min read
How to Reset Your Local Git Branch

How to Reset Your Local Git Branch

Comments
5 min read
Greatly improve your Health Endpoint with these tips!

Greatly improve your Health Endpoint with these tips!

1
Comments
2 min read
Understanding Kubernetes Jobs

Understanding Kubernetes Jobs

4
Comments
5 min read
Securing external-dns: Encrypting TXT Registry Records

Securing external-dns: Encrypting TXT Registry Records

Comments
5 min read
SSL Pinning in React Native for iOS and Android

SSL Pinning in React Native for iOS and Android

Comments
3 min read
Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

2
Comments
1 min read
Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Comments
5 min read
Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Comments
5 min read
Learn about basic Authentication

Learn about basic Authentication

1
Comments
4 min read
Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Comments
3 min read
Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
Deleting Git Commits

Deleting Git Commits

4
Comments
5 min read
Git Undo Last Commit

Git Undo Last Commit

4
Comments
4 min read
What is VPC Flow Log ? How to Enable VPC Log

What is VPC Flow Log ? How to Enable VPC Log

Comments
2 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

Comments
14 min read
Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Comments
3 min read
Protecting Your Application with CSRF in Lithe

Protecting Your Application with CSRF in Lithe

3
Comments
4 min read
How to Safely Delete Local and Remote Branches in Git

How to Safely Delete Local and Remote Branches in Git

7
Comments 1
5 min read
Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

1
Comments
4 min read
𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Hacking (and securing) GraphQL

Hacking (and securing) GraphQL

2
Comments
13 min read
AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

3
Comments
6 min read
Advanced JWT Exploitation Techniques: Going Beyond the Basics

Advanced JWT Exploitation Techniques: Going Beyond the Basics

Comments
5 min read
How to Discard Local Changes in Git

How to Discard Local Changes in Git

5
Comments
5 min read
What Does a Cyber Security Analyst Do?

What Does a Cyber Security Analyst Do?

Comments
2 min read
Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Comments
2 min read
Mseal in Linux: An un-hackable solution?

Mseal in Linux: An un-hackable solution?

1
Comments
3 min read
The Human Hack: When Cybercriminals Become Master Manipulators

The Human Hack: When Cybercriminals Become Master Manipulators

Comments
2 min read
Disable password expiration in Windows

Disable password expiration in Windows

Comments
1 min read
🔒 Protégez votre site WordPress : Sécurité et Backup, les indispensables pour bien débuter 🔒

🔒 Protégez votre site WordPress : Sécurité et Backup, les indispensables pour bien débuter 🔒

1
Comments
2 min read
What is CDR?

What is CDR?

Comments
3 min read
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Comments
1 min read
10 LLM Security Tools to Know in 2024

10 LLM Security Tools to Know in 2024

Comments
1 min read
Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Comments
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It

OAuth2 Client Credentials Grant Type: When and How to Use It

Comments
4 min read
OAuth2 vs. OpenID Connect: Understanding the Differences

OAuth2 vs. OpenID Connect: Understanding the Differences

Comments
3 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Comments
4 min read
Spring Security: Implementing JWT Authentication in Your Java Application

Spring Security: Implementing JWT Authentication in Your Java Application

Comments
4 min read
Why You Should Be Using a Password Manager

Why You Should Be Using a Password Manager

Comments
3 min read
Passwordless Authentication

Passwordless Authentication

Comments
3 min read
Understanding VPNs: How They Work and Why You Need One

Understanding VPNs: How They Work and Why You Need One

Comments
4 min read
When to Start Secret Rotation

When to Start Secret Rotation

Comments
2 min read
Securing Software Development with Secrets Vaults: A Comprehensive Guide

Securing Software Development with Secrets Vaults: A Comprehensive Guide

Comments
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

Comments
3 min read
Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Comments
2 min read
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Comments
3 min read
OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
JSON Web Tokens (JWTs): A Comprehensive Guide

JSON Web Tokens (JWTs): A Comprehensive Guide

Comments
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
What does CORS really do? 🤔

What does CORS really do? 🤔

Comments
3 min read
Beware of Spring Boot Actuator Endpoint env: A Security Alert

Beware of Spring Boot Actuator Endpoint env: A Security Alert

1
Comments
3 min read
loading...