DEV Community

Security

Hopefully not just an afterthought!

Posts

ūüĎč Sign in for the ability to sort posts by relevant, latest, or top.
Simple PKI with CA issuer

Simple PKI with CA issuer

Reactions 5 Comments
4 min read
Serverless Application is not as secure as you might think!

Serverless Application is not as secure as you might think!

Reactions 7 Comments
5 min read
How to restrict country to access your website with Netlify?

How to restrict country to access your website with Netlify?

Reactions 5 Comments
1 min read
How to warn users about external links

How to warn users about external links

Reactions 8 Comments
3 min read
RepoMetaScore: evaluate supply chain risks of open-source projects

RepoMetaScore: evaluate supply chain risks of open-source projects

Reactions 7 Comments 1
2 min read
How-to Get Free API Security Testing Report

How-to Get Free API Security Testing Report

Reactions 6 Comments
1 min read
Two-factor authentication: How Beagle Security handles 2FA security testing

Two-factor authentication: How Beagle Security handles 2FA security testing

Reactions 6 Comments
1 min read
Encrypting Folders on MacOS

Encrypting Folders on MacOS

Reactions 2 Comments
1 min read
Running Basic Security Tests Against Twitter API

Running Basic Security Tests Against Twitter API

Reactions 4 Comments
1 min read
Why is Data Security a Developer Service Problem?

Why is Data Security a Developer Service Problem?

Reactions 6 Comments
5 min read
How to provide restricted & secure access to a third party, to your AWS accounts, using Attribute Based Access Control (ABAC)

How to provide restricted & secure access to a third party, to your AWS accounts, using Attribute Based Access Control (ABAC)

Reactions 6 Comments
8 min read
Machine Learning In Cyber Security

Machine Learning In Cyber Security

Reactions 4 Comments
4 min read
What is AWS Detective?

What is AWS Detective?

Reactions 5 Comments
2 min read
Desarrolla de forma segura, aplicando DevSecOps

Desarrolla de forma segura, aplicando DevSecOps

Reactions 10 Comments
5 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade

Como eu descobri uma falha de segurança em um sistema na minha universidade

Reactions 6 Comments
6 min read
Delegate Call - Context is Preserved

Delegate Call - Context is Preserved

Reactions 6 Comments
1 min read
PyScript XSS

PyScript XSS

Reactions 7 Comments
1 min read
Delegate Call - Order of Variables

Delegate Call - Order of Variables

Reactions 6 Comments
2 min read
Getting started developing Falco

Getting started developing Falco

Reactions 5 Comments
8 min read
Enarx: The future of Trusted Execution Environment Frameworks

Enarx: The future of Trusted Execution Environment Frameworks

Reactions 9 Comments
3 min read
EthernautÁ≥ĽŚąó-ŤĮīśėé

EthernautÁ≥ĽŚąó-ŤĮīśėé

Reactions 5 Comments
1 min read
A new tool for recon Office365 users

A new tool for recon Office365 users

Reactions 6 Comments
1 min read
GitHub’s inconsistent access control

GitHub’s inconsistent access control

Reactions 4 Comments
4 min read
Controlling access in service-to-service communications with Cognito - Part 2

Controlling access in service-to-service communications with Cognito - Part 2

Reactions 10 Comments
5 min read
How to connect SuperTokens to a MySQL or to a PostgreSQL database

How to connect SuperTokens to a MySQL or to a PostgreSQL database

Reactions 6 Comments
11 min read
Build a discoverable change password form

Build a discoverable change password form

Reactions 9 Comments
1 min read
JWT, access token, and refresh token

JWT, access token, and refresh token

Reactions 3 Comments
3 min read
Simpler way to secure data with Ruby and Basis Theory

Simpler way to secure data with Ruby and Basis Theory

Reactions 6 Comments
3 min read
Prevent External Contracts

Prevent External Contracts

Reactions 6 Comments
2 min read
Types of Steganography methods that are used for hiding confidential data.

Types of Steganography methods that are used for hiding confidential data.

Reactions 8 Comments
4 min read
Careful while using tx.origin

Careful while using tx.origin

Reactions 7 Comments
2 min read
Denial of Service

Denial of Service

Reactions 9 Comments
1 min read
Accessing external Secrets in Gitlab CI

Accessing external Secrets in Gitlab CI

Reactions 10 Comments
2 min read
Avoiding code flaws, ok, but how?

Avoiding code flaws, ok, but how?

Reactions 10 Comments
3 min read
Controlling access to the API with Lambda authorizers

Controlling access to the API with Lambda authorizers

Reactions 9 Comments
6 min read
Security Pillar - Best Practice Areas

Security Pillar - Best Practice Areas

Reactions 3 Comments
2 min read
Force Send ETH - 2

Force Send ETH - 2

Reactions 10 Comments
2 min read
Arithmetic overflow/underflow

Arithmetic overflow/underflow

Reactions 10 Comments
2 min read
Force Send ETH - 1

Force Send ETH - 1

Reactions 9 Comments
1 min read
Re-Entrancy

Re-Entrancy

Reactions 9 Comments
2 min read
Preventing User Enumeration Attack in Laravel Apps

Preventing User Enumeration Attack in Laravel Apps

Reactions 9 Comments
5 min read
How to deploy SuperTokens with React and NodeJS on Vercel

How to deploy SuperTokens with React and NodeJS on Vercel

Reactions 9 Comments
3 min read
SaaS login trends

SaaS login trends

Reactions 3 Comments
1 min read
Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

Reactions 3 Comments 1
4 min read
SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

Reactions 3 Comments
7 min read
Passwordless face login with Entry in the React app

Passwordless face login with Entry in the React app

Reactions 6 Comments
3 min read
Setup Amazon GuardDuty and understand its feature

Setup Amazon GuardDuty and understand its feature

Reactions 3 Comments
3 min read
Secure TCP tunnel from anywhere with curl and nc for single connection

Secure TCP tunnel from anywhere with curl and nc for single connection

Reactions 6 Comments
14 min read
Helpot ohjeet salasanamanagerin käyttöön

Helpot ohjeet salasanamanagerin käyttöön

Reactions 4 Comments
4 min read
While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

While Cloud Adoption May Be An Obvious Choice, Is It Really Secure?

Reactions 4 Comments
4 min read
Hey guys! If you're looking to get feedback on your API security, drop a link here ūüĎá I Would love to help.

Hey guys! If you're looking to get feedback on your API security, drop a link here ūüĎá I Would love to help.

Reactions 4 Comments 1
1 min read
AWS Well-Architected Framework - Security Pillar

AWS Well-Architected Framework - Security Pillar

Reactions 4 Comments
2 min read
OpenAPI Specification: The Complete Guide

OpenAPI Specification: The Complete Guide

Reactions 25 Comments 1
5 min read
Storing Access Policies in Policy Files vs. in a Database

Storing Access Policies in Policy Files vs. in a Database

Reactions 5 Comments
5 min read
Calling the brute(force) squad

Calling the brute(force) squad

Reactions 5 Comments
6 min read
B2B SSO for SaaS applications - Don't Build. No-Code It

B2B SSO for SaaS applications - Don't Build. No-Code It

Reactions 4 Comments
1 min read
#1 iOS Security Tips: UIPasteboard | iOS Development

#1 iOS Security Tips: UIPasteboard | iOS Development

Reactions 7 Comments
1 min read
Security doesn’t have to be a blocker

Security doesn’t have to be a blocker

Reactions 3 Comments
3 min read
Free Trial! Beosin Vaa, the industry-leading automatic smart contract security analysis platform

Free Trial! Beosin Vaa, the industry-leading automatic smart contract security analysis platform

Reactions 3 Comments
1 min read
Threat Detection on EKS ‚Äď Comparing Falco and GuardDuty For EKS Protection

Threat Detection on EKS ‚Äď Comparing Falco and GuardDuty For EKS Protection

Reactions 7 Comments
8 min read
loading...