DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
API Security Tools: Threat Protection vs. Testing & 8 Tools to Know

API Security Tools: Threat Protection vs. Testing & 8 Tools to Know

5
Comments
1 min read
How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

How to Secure Your Kubernetes with Ingress-Nginx and SafeLine

6
Comments
3 min read
Integrating Open Source WAF with Wazuh(Part 2)

Integrating Open Source WAF with Wazuh(Part 2)

16
Comments
7 min read
Integrating Open Source WAF with Wazuh (Part 3)

Integrating Open Source WAF with Wazuh (Part 3)

17
Comments
2 min read
Integrating Open Source WAF with Wazuh(Part 1)

Integrating Open Source WAF with Wazuh(Part 1)

16
Comments
4 min read
How to Configure an Open Source WAF, SafeLine

How to Configure an Open Source WAF, SafeLine

17
Comments
4 min read
🔐 Information Security and Data Privacy: Protect Your Online Information

🔐 Information Security and Data Privacy: Protect Your Online Information

2
Comments
3 min read
Deploying High Availability SafeLine WAF on K3s(Part 4)

Deploying High Availability SafeLine WAF on K3s(Part 4)

17
Comments
4 min read
The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

3
Comments
4 min read
Deploying High Availability SafeLine WAF on K3s(Part 2)

Deploying High Availability SafeLine WAF on K3s(Part 2)

13
Comments
9 min read
Deploying High Availability SafeLine WAF on K3s(Part 3)

Deploying High Availability SafeLine WAF on K3s(Part 3)

14
Comments
4 min read
Deploying High Availability SafeLine WAF on K3s(Part 1)

Deploying High Availability SafeLine WAF on K3s(Part 1)

11
Comments
5 min read
Guide: How to Add Passkeys to Enterprise Systems

Guide: How to Add Passkeys to Enterprise Systems

1
Comments
3 min read
My Journey with SafeLine: A Practical Tool for Web Security

My Journey with SafeLine: A Practical Tool for Web Security

7
Comments
2 min read
Understanding Cross-Site Request Forgery (CSRF) and Preventing It with SafeLine WAF

Understanding Cross-Site Request Forgery (CSRF) and Preventing It with SafeLine WAF

19
Comments 1
3 min read
Ansible and Cybersecurity

Ansible and Cybersecurity

Comments
3 min read
Artificial Intelligence in Cybersecurity: New Solutions for New Threats

Artificial Intelligence in Cybersecurity: New Solutions for New Threats

39
Comments 11
6 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

1
Comments
2 min read
Understanding Directory Traversal and Preventing It with SafeLine WAF

Understanding Directory Traversal and Preventing It with SafeLine WAF

15
Comments
2 min read
Understanding Cross-Site Scripting (XSS) and Prevent it with SafeLine WAF

Understanding Cross-Site Scripting (XSS) and Prevent it with SafeLine WAF

15
Comments
3 min read
How to Prevent Brute Force Attacks with SafeLine WAF

How to Prevent Brute Force Attacks with SafeLine WAF

14
Comments
3 min read
HTTPS and SSLs: Why They Matter, How to Use Them

HTTPS and SSLs: Why They Matter, How to Use Them

Comments
5 min read
L'importance croissante de la cybersécurité dans le monde moderne

L'importance croissante de la cybersécurité dans le monde moderne

1
Comments 1
1 min read
Securely Deploy SafeLine WAF: A Step-by-Step Guide

Securely Deploy SafeLine WAF: A Step-by-Step Guide

7
Comments
2 min read
The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

Comments
6 min read
SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

SafeLine WAF: Step-by-Step Guide to Secure Your Web Environment

17
Comments
3 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

9
Comments 3
10 min read
The Ultimate Guide to Understanding Web Application Authentication

The Ultimate Guide to Understanding Web Application Authentication

18
Comments
3 min read
A Deep Dive into SafeLine WAF and API Gateway Integration

A Deep Dive into SafeLine WAF and API Gateway Integration

15
Comments
4 min read
The Rise of Rust in Cybersecurity: What You Need to Know

The Rise of Rust in Cybersecurity: What You Need to Know

5
Comments 2
3 min read
6 Powerful Free Security Tools That Will Surprise You

6 Powerful Free Security Tools That Will Surprise You

10
Comments
3 min read
Hello DEV Community!

Hello DEV Community!

Comments
1 min read
Building a Simple Image Encryption Tool Using Python

Building a Simple Image Encryption Tool Using Python

2
Comments
4 min read
What is Input Validation in Web Development

What is Input Validation in Web Development

15
Comments
4 min read
The Beginner's Guide to Install and Deploy SafeLine WAF

The Beginner's Guide to Install and Deploy SafeLine WAF

7
Comments
3 min read
Networking in Cybersecurity: The Essential Guide to Protecting Your Digital Infrastructure

Networking in Cybersecurity: The Essential Guide to Protecting Your Digital Infrastructure

Comments 1
1 min read
Web App Sec: Addressing the Core Problem of Arbitrary Input Submission

Web App Sec: Addressing the Core Problem of Arbitrary Input Submission

1
Comments
3 min read
Implementing a Caesar Cipher Program in Python

Implementing a Caesar Cipher Program in Python

2
Comments
4 min read
Hot Takes and Cool Strategies: BSides Las Vegas 2024

Hot Takes and Cool Strategies: BSides Las Vegas 2024

Comments
6 min read
Build An Advanced Password Cracker With Python (Complete Guide)

Build An Advanced Password Cracker With Python (Complete Guide)

9
Comments
8 min read
No Matching Passkeys Available: Troubleshooting Your Login Issue

No Matching Passkeys Available: Troubleshooting Your Login Issue

5
Comments
2 min read
Proxmox NAS Storage: Securing a Samba DAS

Proxmox NAS Storage: Securing a Samba DAS

Comments
5 min read
Open Source Tool List for Web App Security

Open Source Tool List for Web App Security

2
Comments
4 min read
7 Best Practices for Container Security

7 Best Practices for Container Security

Comments
6 min read
The Beginner's Guide to Understanding WebSocket

The Beginner's Guide to Understanding WebSocket

99
Comments 10
3 min read
Passwords: Are they going extinct?

Passwords: Are they going extinct?

6
Comments
6 min read
New Vulnerability Scanner (Must Try)

New Vulnerability Scanner (Must Try)

6
Comments
1 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
A Beginner's Guide to Understand Web Applications

A Beginner's Guide to Understand Web Applications

Comments 1
5 min read
Build Your First Port Scanner using Python in 2024

Build Your First Port Scanner using Python in 2024

9
Comments 2
5 min read
Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

1
Comments
6 min read
Cybersecurity Awareness Month: Stay Safe Online

Cybersecurity Awareness Month: Stay Safe Online

1
Comments
3 min read
Top 11 DevOps Security Tools

Top 11 DevOps Security Tools

1
Comments
9 min read
A Complete Guide to Social Engineering Attacks.

A Complete Guide to Social Engineering Attacks.

5
Comments
4 min read
How to Activate Microsoft Passkeys on Windows

How to Activate Microsoft Passkeys on Windows

1
Comments
3 min read
Optimizing Docker for High Security: Combining Docker and SafeLine

Optimizing Docker for High Security: Combining Docker and SafeLine

6
Comments
3 min read
Boost API Security: Kong and SafeLine WAF Integration Guide

Boost API Security: Kong and SafeLine WAF Integration Guide

6
Comments
2 min read
How to Secure Your Web Apps: A Free and Powerful WAF

How to Secure Your Web Apps: A Free and Powerful WAF

7
Comments
2 min read
Walkthrough / Solution to SBT's Wireshark Challenge Activity

Walkthrough / Solution to SBT's Wireshark Challenge Activity

3
Comments
6 min read
Fortify Your Website for Free: Testing the Power of SafeLine

Fortify Your Website for Free: Testing the Power of SafeLine

6
Comments
3 min read
loading...