DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

Custom SSL Configurations, Rate Limiting, and More in SafeLine's Latest Update

6
Comments
2 min read
5 Use Cases for Using Open Policy Agent

5 Use Cases for Using Open Policy Agent

Comments
7 min read
AI against Daunting Security: The Future of Self-Rule Hacking

AI against Daunting Security: The Future of Self-Rule Hacking

5
Comments
1 min read
What is a subnet? | How subnetting works

What is a subnet? | How subnetting works

4
Comments
7 min read
Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

Detectar, analizar y explotar vulnerabilidades utilizando herramientas de código abierto: Medición de desempeño y resultados

2
Comments
15 min read
# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero

# Exploring the Risks of RFID WiFi Tags: Copying and Emulating with a Flipper zero

Comments
5 min read
How to Run Open Source WAF SafeLine on K8s

How to Run Open Source WAF SafeLine on K8s

14
Comments
4 min read
Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

Open Source WAF SafeLine: Offline One-Click Installation, Upgrade, and Configuration

17
Comments
4 min read
Why You Need to Protect Your Website and How

Why You Need to Protect Your Website and How

6
Comments
3 min read
Update / Delete Passkeys via WebAuthn Signal API

Update / Delete Passkeys via WebAuthn Signal API

1
Comments
3 min read
Discover What's New in SafeLine 6.8.0

Discover What's New in SafeLine 6.8.0

5
Comments
1 min read
Why is HTTP not secure? | HTTP vs. HTTPS

Why is HTTP not secure? | HTTP vs. HTTPS

5
Comments
3 min read
Dealing with Frontend Security Issues

Dealing with Frontend Security Issues

Comments
4 min read
Mastering Code: Why Programming is Indispensable in Cybersecurity

Mastering Code: Why Programming is Indispensable in Cybersecurity

1
Comments 1
1 min read
SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

SafeLine WAF 101- Configuring Site HTTP Redirection to HTTPS

6
Comments
2 min read
Network Security Enforcement and Best Practices.

Network Security Enforcement and Best Practices.

1
Comments
4 min read
Using Open Source WAF to Address Crawlers Occupying Significant Network Bandwidth

Using Open Source WAF to Address Crawlers Occupying Significant Network Bandwidth

6
Comments
3 min read
Tutorial: Implement Authentication in Next.js

Tutorial: Implement Authentication in Next.js

1
Comments
43 min read
Four Common Deployment Modes of WAF

Four Common Deployment Modes of WAF

5
Comments
4 min read
Five Free WAF Performance Comparison

Five Free WAF Performance Comparison

3
Comments
4 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
What is Responsible AI?

What is Responsible AI?

1
Comments
11 min read
First Impressions of SafeLine: The Most Starred Open-Source WAF on GitHub

First Impressions of SafeLine: The Most Starred Open-Source WAF on GitHub

5
Comments
3 min read
Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

9
Comments
5 min read
How AI and Security are intertwined in todays tech world.

How AI and Security are intertwined in todays tech world.

1
Comments
3 min read
loading...