DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding network virtualization and how it helps in day-to-day infrastructure.

Understanding network virtualization and how it helps in day-to-day infrastructure.

Comments
5 min read
Security news weekly round-up - 26th July 2024

Security news weekly round-up - 26th July 2024

Comments
3 min read
Automating Kubernetes Security with Kyverno : Day 16 of 50 days DevOps Tools Series

Automating Kubernetes Security with Kyverno : Day 16 of 50 days DevOps Tools Series

1
Comments
3 min read
Why Use Rust?

Why Use Rust?

Comments
3 min read
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança

Comments
3 min read
Why Businesses Rely on CrowdStrike for Cybersecurity

Why Businesses Rely on CrowdStrike for Cybersecurity

4
Comments
3 min read
Complete Guide To Redeeming TECNO SRC Credits

Complete Guide To Redeeming TECNO SRC Credits

Comments
1 min read
Form Login with Spring Boot and Thymeleaf

Form Login with Spring Boot and Thymeleaf

Comments
7 min read
Linux commands to analyze DDoS attacks

Linux commands to analyze DDoS attacks

Comments
3 min read
Comandos Linux para analisar ataques DDoS

Comandos Linux para analisar ataques DDoS

Comments
3 min read
How to provision an AWS WAF using AWS CDK

How to provision an AWS WAF using AWS CDK

1
Comments
4 min read
How to Hire an Android Developer for Your Project in 2024

How to Hire an Android Developer for Your Project in 2024

Comments
5 min read
Unity Catalog for IRIS Workloads - Collision Theory Confirmed

Unity Catalog for IRIS Workloads - Collision Theory Confirmed

1
Comments
5 min read
Stop Leaking Env Secrets: Your Password Manager Holds the Key

Stop Leaking Env Secrets: Your Password Manager Holds the Key

Comments
7 min read
Introduction to Web Application Firewalls (WAF)

Introduction to Web Application Firewalls (WAF)

Comments
1 min read
Introduction to Vault

Introduction to Vault

Comments
2 min read
Day 18: Centralized ELK Stack Setup

Day 18: Centralized ELK Stack Setup

1
Comments
2 min read
Unlocking Security: The Ultimate Guide to Password Managers

Unlocking Security: The Ultimate Guide to Password Managers

Comments
2 min read
How to make “Input validation” easy for your devs

How to make “Input validation” easy for your devs

Comments
5 min read
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Comments
8 min read
Sumo Tatami x Serverspace

Sumo Tatami x Serverspace

Comments
2 min read
Using TruffleHog and pre-commit hook to prevent secret exposure

Using TruffleHog and pre-commit hook to prevent secret exposure

1
Comments
3 min read
Lanjutan Lapisan OSI

Lanjutan Lapisan OSI

Comments
3 min read
Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

3
Comments
3 min read
Security-charging Your NextJS 14 App with Userfront Authentication

Security-charging Your NextJS 14 App with Userfront Authentication

1
Comments
8 min read
Guard Your Digital Fortress: Essential Tips for Safeguarding Your Online Identity

Guard Your Digital Fortress: Essential Tips for Safeguarding Your Online Identity

1
Comments
2 min read
Ensuring GCE instances have full access to GCP APIs

Ensuring GCE instances have full access to GCP APIs

Comments
1 min read
Unveiling the Future of Cybersecurity: How AI is Revolutionizing Protection Online

Unveiling the Future of Cybersecurity: How AI is Revolutionizing Protection Online

Comments
2 min read
3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

6
Comments
3 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

Comments
6 min read
Sign in with Apple for Node.js

Sign in with Apple for Node.js

Comments
7 min read
CrowdStrike Blew Up the Internet

CrowdStrike Blew Up the Internet

Comments
2 min read
5 Best Video Hosting Platforms for 2024

5 Best Video Hosting Platforms for 2024

Comments
4 min read
Alien biohazard approach to security

Alien biohazard approach to security

Comments
2 min read
The Silent Threat: Cybersecurity Risks Every Small Business Must Confront

The Silent Threat: Cybersecurity Risks Every Small Business Must Confront

Comments
2 min read
Configuring Routes for Azure Firewall (Part 4)

Configuring Routes for Azure Firewall (Part 4)

Comments
2 min read
ShellCode 1.0

ShellCode 1.0

1
Comments
3 min read
VerifyVault v0.4.1 has been RELEASED! 🚀

VerifyVault v0.4.1 has been RELEASED! 🚀

1
Comments
1 min read
Security Meetup

Security Meetup

Comments
1 min read
Decrypting the Future: The Evolution of Ransomware and How to Safeguard Against It

Decrypting the Future: The Evolution of Ransomware and How to Safeguard Against It

Comments
2 min read
Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
2 min read
Up(sun) and running with Rust: The game-changer in systems programming

Up(sun) and running with Rust: The game-changer in systems programming

Comments
1 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
Quick Facts On the AT&T Breach

Quick Facts On the AT&T Breach

Comments
1 min read
Prescription for Cybersecurity: Safeguarding Healthcare Data in the Digital Age

Prescription for Cybersecurity: Safeguarding Healthcare Data in the Digital Age

1
Comments
2 min read
How to disable Spring Security for static resources

How to disable Spring Security for static resources

Comments
2 min read
Biometric Boom: The Future of Authentication Is Here

Biometric Boom: The Future of Authentication Is Here

Comments
2 min read
Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

2
Comments
2 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

10
Comments
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

9
Comments
3 min read
Enhanced Web Application Security with Azure Network Security Groups and Application Security Groups (Part 2)

Enhanced Web Application Security with Azure Network Security Groups and Application Security Groups (Part 2)

7
Comments
4 min read
Gitleaks: Find forgotten codes in your repositories

Gitleaks: Find forgotten codes in your repositories

Comments
1 min read
Exposed: The Shocking Truth About Data Breaches You Need to Know!

Exposed: The Shocking Truth About Data Breaches You Need to Know!

Comments
2 min read
Security news weekly round-up - 12th July 2024

Security news weekly round-up - 12th July 2024

Comments
4 min read
How to avoid one of the biggest risks in mobile security as an iOS developer

How to avoid one of the biggest risks in mobile security as an iOS developer

Comments
6 min read
Top 10 Cloud Security Startups to Watch in 2024

Top 10 Cloud Security Startups to Watch in 2024

8
Comments
6 min read
EnvLock: The Ultimate Env Manager

EnvLock: The Ultimate Env Manager

7
Comments 2
4 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

1
Comments
3 min read
loading...