DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
6 Tools To Help Keep Your Dependencies And Code More Secure

6 Tools To Help Keep Your Dependencies And Code More Secure

16
Comments
8 min read
How To Implement AWS SSB Controls in Terraform - Part 2

How To Implement AWS SSB Controls in Terraform - Part 2

1
Comments
9 min read
Compliant infrastructure using infrastructure as code

Compliant infrastructure using infrastructure as code

2
Comments
6 min read
10 Ways To Ensure Successful Mobile App Security

10 Ways To Ensure Successful Mobile App Security

1
Comments
4 min read
Strengthening the Secure Supply Chain

Strengthening the Secure Supply Chain

1
Comments
12 min read
A rant on data breaches

A rant on data breaches

Comments
2 min read
How do you balance code completeness, security, and maintainability when creating example code?

How do you balance code completeness, security, and maintainability when creating example code?

1
Comments
1 min read
Introduction to Cryptography in Python

Introduction to Cryptography in Python

Comments
2 min read
Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Comments
2 min read
Building a Universally Portable Python App

Building a Universally Portable Python App

Comments
5 min read
Finding the Optimal Bcrypt Rounds for Your Machine

Finding the Optimal Bcrypt Rounds for Your Machine

Comments
3 min read
Understanding Bcrypt Rounds: Balancing Security and Performance

Understanding Bcrypt Rounds: Balancing Security and Performance

Comments
2 min read
How is Amazon Web Services ensuring AI is Securely handling Our Data?

How is Amazon Web Services ensuring AI is Securely handling Our Data?

1
Comments
5 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Comments
2 min read
New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Integrate an Audit Trail for NextAuth.js in a few lines of code

Integrate an Audit Trail for NextAuth.js in a few lines of code

Comments
3 min read
SecretService: Library for Storing Secrets in Google Apps Script

SecretService: Library for Storing Secrets in Google Apps Script

Comments
2 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
Simplify Configuration Management for Efficient Cloud Operations

Simplify Configuration Management for Efficient Cloud Operations

Comments
3 min read
What's New With AWS Security? | February Edition

What's New With AWS Security? | February Edition

2
Comments 1
3 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
The importance of stateless architecture in authorization systems

The importance of stateless architecture in authorization systems

Comments
7 min read
GitLab Vulnerabilities And Security Incidents: 2023 In Review

GitLab Vulnerabilities And Security Incidents: 2023 In Review

Comments
7 min read
Key derivation in .NET using HKDF

Key derivation in .NET using HKDF

Comments
3 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

Comments
2 min read
All You Need To Know To Secure Your Data From Phishing

All You Need To Know To Secure Your Data From Phishing

6
Comments
4 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

Comments
7 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Discover the Difference Between Port 80 and 443

Discover the Difference Between Port 80 and 443

6
Comments 1
3 min read
ASP.Net 9.0: Authentication Enhancements

ASP.Net 9.0: Authentication Enhancements

2
Comments
2 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
How to manage Access Control in Solidity Smart Contract

How to manage Access Control in Solidity Smart Contract

Comments
3 min read
Workshop - How to Write Custom Security Tests

Workshop - How to Write Custom Security Tests

Comments
1 min read
O que é HTTP?

O que é HTTP?

1
Comments
3 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
Start to Learn Secure App with Ruby on Rails

Start to Learn Secure App with Ruby on Rails

2
Comments
6 min read
AWS VPC Endpoint is JUST a FinOps topic!?

AWS VPC Endpoint is JUST a FinOps topic!?

2
Comments
3 min read
A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey

A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey

5
Comments
2 min read
REST API Security Comprehensive Guide

REST API Security Comprehensive Guide

1
Comments
6 min read
Analysing the Differences between WebSocket and WebRTC

Analysing the Differences between WebSocket and WebRTC

4
Comments
6 min read
Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Comments
5 min read
Checklist for designing cloud-native applications – Part 2: Security aspects

Checklist for designing cloud-native applications – Part 2: Security aspects

2
Comments
7 min read
Double Down on Security: IAM MFA in AWS

Double Down on Security: IAM MFA in AWS

Comments
2 min read
Civo Navigate 2024: Scaling Community And Containers In Austin

Civo Navigate 2024: Scaling Community And Containers In Austin

1
Comments
6 min read
File Injection and Path Traversal vulnerabilities

File Injection and Path Traversal vulnerabilities

1
Comments
4 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
GitHub Actions for Secret Management

GitHub Actions for Secret Management

13
Comments
3 min read
Workflow Integration with AI: A Unified Approach to Development

Workflow Integration with AI: A Unified Approach to Development

10
Comments
10 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

5
Comments
8 min read
Quick guide to applying MuleSoft's API Autodiscovery

Quick guide to applying MuleSoft's API Autodiscovery

Comments
2 min read
SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

30
Comments 3
3 min read
Apple Announces PQ3

Apple Announces PQ3

1
Comments
1 min read
Android Security Tips

Android Security Tips

2
Comments
3 min read
Next.js: Crafting a Strict CSP

Next.js: Crafting a Strict CSP

1
Comments
4 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
Let's Play Snyk 🐶

Let's Play Snyk 🐶

2
Comments 3
5 min read
Announcing our Capture the Flag Challenge: broken-navigator

Announcing our Capture the Flag Challenge: broken-navigator

5
Comments
2 min read
loading...