DEV Community

# applicationsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to verify and secure your Mastodon account

How to verify and secure your Mastodon account

Comments
4 min read
10 AWS security considerations when migrating

10 AWS security considerations when migrating

Comments
6 min read
How to use GitHub Actions environment variables

How to use GitHub Actions environment variables

2
Comments
7 min read
How to write tests in Python using doctest

How to write tests in Python using doctest

2
Comments
5 min read
Writing unit tests in Java

Writing unit tests in Java

Comments
7 min read
Setting up SSL/TLS for Kubernetes Ingress

Setting up SSL/TLS for Kubernetes Ingress

Comments
10 min read
Dependency injection in JavaScript

Dependency injection in JavaScript

1
Comments
8 min read
5 best practices for building modern access control for cloud applications

5 best practices for building modern access control for cloud applications

Comments
5 min read
Implementing TLS in Java

Implementing TLS in Java

Comments
9 min read
NPM security: preventing supply chain attacks

NPM security: preventing supply chain attacks

Comments
15 min read
Breaking down the ‘critical’ OpenSSL vulnerability

Breaking down the ‘critical’ OpenSSL vulnerability

Comments
7 min read
A day in the life of a CISO: Chris Hughes of Aquia

A day in the life of a CISO: Chris Hughes of Aquia

3
Comments
4 min read
Secure Python URL validation

Secure Python URL validation

2
Comments
7 min read
Update: OpenSSL high severity vulnerabilities

Update: OpenSSL high severity vulnerabilities

Comments
4 min read
Ruby on Rails Docker for local development environment

Ruby on Rails Docker for local development environment

Comments
8 min read
How to create SBOMs in Java with Maven and Gradle

How to create SBOMs in Java with Maven and Gradle

2
Comments
8 min read
Top 5 scary AWS misconfigurations

Top 5 scary AWS misconfigurations

Comments
4 min read
Container images simplified with Ko

Container images simplified with Ko

Comments
14 min read
A Talk About Java Serialization and Deserialization

A Talk About Java Serialization and Deserialization

1
Comments
6 min read
How to Fix MSDT Vulnerability using SCCM and Intune | CVE-2022-30190

How to Fix MSDT Vulnerability using SCCM and Intune | CVE-2022-30190

3
Comments
7 min read
Why fuzzing tools should be part of your security toolkit

Why fuzzing tools should be part of your security toolkit

Comments
7 min read
Node.js multithreading with worker threads series: worker_threads tutorial

Node.js multithreading with worker threads series: worker_threads tutorial

Comments
10 min read
Secure JavaScript URL validation

Secure JavaScript URL validation

Comments
8 min read
Implementing TLS/SSL in Python

Implementing TLS/SSL in Python

Comments
6 min read
Improving code quality with linting in Python

Improving code quality with linting in Python

Comments
7 min read
Security lessons with a Snyk Ambassador

Security lessons with a Snyk Ambassador

Comments
5 min read
Red teams vs blue teams: Breaking down security roles

Red teams vs blue teams: Breaking down security roles

Comments
5 min read
Why developers hold the key to cloud security

Why developers hold the key to cloud security

Comments
6 min read
How Snyk can help secure supply chains per Executive Order M-21-30

How Snyk can help secure supply chains per Executive Order M-21-30

Comments
8 min read
How to install Ruby in a macOS for local development

How to install Ruby in a macOS for local development

1
Comments
7 min read
Looking back at Black Hat USA 2022

Looking back at Black Hat USA 2022

Comments
5 min read
Avoiding SMTP Injection: A Whitebox primer

Avoiding SMTP Injection: A Whitebox primer

Comments
7 min read
Using Kubernetes ConfigMaps securely

Using Kubernetes ConfigMaps securely

Comments
7 min read
Best practices for API gateway security

Best practices for API gateway security

Comments
6 min read
How to find and fix XML entity vulnerabilities

How to find and fix XML entity vulnerabilities

Comments
9 min read
Solve Hack the Box and other CTF challenges with Snyk

Solve Hack the Box and other CTF challenges with Snyk

1
Comments
8 min read
Best practices for containerizing .net applications

Best practices for containerizing .net applications

1
Comments
9 min read
Best practices for container isolation

Best practices for container isolation

2
Comments
7 min read
Applying the principle of least privilege to Kubernetes using RBAC

Applying the principle of least privilege to Kubernetes using RBAC

Comments 1
7 min read
Best practices for managing Java dependencies

Best practices for managing Java dependencies

3
Comments
8 min read
A definitive guide to Ruby gems dependency management

A definitive guide to Ruby gems dependency management

2
Comments
11 min read
Detecting log4j using ShiftLeft CORE

Detecting log4j using ShiftLeft CORE

6
Comments
2 min read
Best Practices for Application Security in the Cloud

Best Practices for Application Security in the Cloud

2
Comments
8 min read
Mobile Security: OWASP List

Mobile Security: OWASP List

3
Comments
3 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

17
Comments
2 min read
Application Security Best Practices / Defensive Programming

Application Security Best Practices / Defensive Programming

21
Comments
12 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

22
Comments
4 min read
All about SIEM

All about SIEM

3
Comments
2 min read
Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Ryan Lockard Names the Seven Deadly Sins of DevSecOps

2
Comments
1 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

2
Comments
1 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

49
Comments 2
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

18
Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

17
Comments
1 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

11
Comments 1
1 min read
Simple Tool for Testing CVE Mitigation in Web Apps

Simple Tool for Testing CVE Mitigation in Web Apps

9
Comments 1
4 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

75
Comments 5
1 min read
Implementing Authentication with Azure AD

Implementing Authentication with Azure AD

11
Comments
1 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

14
Comments
6 min read
Implement Secure data solutions

Implement Secure data solutions

5
Comments
2 min read
loading...