DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Segurança de servidores remotos

Segurança de servidores remotos

Comments
1 min read
End Of Series: SQL Injection Detect & Defend

End Of Series: SQL Injection Detect & Defend

5
Comments
1 min read
Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

Part 9: SQL Injection Series - Building Honeypots for Real-Time Detection

5
Comments
3 min read
Understanding Rate Limiting: A Guide to Protecting Your APIs and Applications

Understanding Rate Limiting: A Guide to Protecting Your APIs and Applications

Comments
4 min read
Just-in-Time Database Access

Just-in-Time Database Access

5
Comments
2 min read
API Authentication: Part II. API Keys

API Authentication: Part II. API Keys

Comments
15 min read
DevOps: Shift Left for Early Testing and Security

DevOps: Shift Left for Early Testing and Security

Comments
2 min read
Part 6: SQL Injection Series: Case Studies and Lessons Learned

Part 6: SQL Injection Series: Case Studies and Lessons Learned

6
Comments
4 min read
Securing Spring Microservice with OAuth 2.0

Securing Spring Microservice with OAuth 2.0

Comments
4 min read
Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

Part 8: SQL Injection Series - Advanced Prevention Techniques and Real-World Applications

6
Comments
2 min read
Part 5: SQL Injection Series: Future Trends and Emerging Challenges

Part 5: SQL Injection Series: Future Trends and Emerging Challenges

5
Comments
4 min read
API Authentication: Part I. Basic Authentication

API Authentication: Part I. Basic Authentication

Comments
11 min read
Ocultando Secretos en los Pixeles 👀

Ocultando Secretos en los Pixeles 👀

Comments
2 min read
Context-menu-Lock

Context-menu-Lock

Comments
1 min read
Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

5
Comments 1
3 min read
Fix Security Misconfigurations in Laravel for Safer Web Apps

Fix Security Misconfigurations in Laravel for Safer Web Apps

Comments
3 min read
Part 7: SQL Injection Series: Advanced SQL Injection Techniques

Part 7: SQL Injection Series: Advanced SQL Injection Techniques

5
Comments 1
4 min read
Resolving ECS Task Definition Security Risks Detected by AWS Security Hub Using Secrets Manager

Resolving ECS Task Definition Security Risks Detected by AWS Security Hub Using Secrets Manager

2
Comments
3 min read
Google Cloud MFA: Is Your Organization Ready?

Google Cloud MFA: Is Your Organization Ready?

Comments
1 min read
Formal Verification: The Foundation of Ethereum Smart Contracts

Formal Verification: The Foundation of Ethereum Smart Contracts

Comments
5 min read
Booting an OS from a Preserved .E01 (EWF) Disk Image File Using Arsenal Image Mounter

Booting an OS from a Preserved .E01 (EWF) Disk Image File Using Arsenal Image Mounter

Comments
3 min read
Disk Preservation Using the Forensic Linux "Tsurugi Linux"

Disk Preservation Using the Forensic Linux "Tsurugi Linux"

Comments
3 min read
Disk Preservation Using the Forensic Linux "Paladin"

Disk Preservation Using the Forensic Linux "Paladin"

Comments
3 min read
Disk Preservation Using the Forensic Linux "C.A.IN.E."

Disk Preservation Using the Forensic Linux "C.A.IN.E."

Comments
3 min read
Security news weekly round-up - 29th November 2024

Security news weekly round-up - 29th November 2024

Comments
3 min read
Choosing an SSL certificate: paid or free — or whether you can do without one

Choosing an SSL certificate: paid or free — or whether you can do without one

5
Comments
8 min read
Free Security Learning Resources: Unlock the World of Cybersecurity

Free Security Learning Resources: Unlock the World of Cybersecurity

Comments
3 min read
Serverless self-service IoT certificate management - Part 1

Serverless self-service IoT certificate management - Part 1

Comments
8 min read
How to Protect ECS Containers with a Read-Only Root Filesystem

How to Protect ECS Containers with a Read-Only Root Filesystem

1
Comments
2 min read
Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Comments
6 min read
Secrets 101: A fun and practical basic guide to avoiding leaks and not becoming a meme

Secrets 101: A fun and practical basic guide to avoiding leaks and not becoming a meme

Comments
4 min read
Secure Device Authentication in Python: Introducing the System Hardware ID Generator Script

Secure Device Authentication in Python: Introducing the System Hardware ID Generator Script

Comments
5 min read
Exploring Podman and Beyond: Open Source Alternatives to Docker for Secure Containerization

Exploring Podman and Beyond: Open Source Alternatives to Docker for Secure Containerization

1
Comments
5 min read
Advanced OAuth2: Refresh Tokens and Token Expiration Strategies

Advanced OAuth2: Refresh Tokens and Token Expiration Strategies

1
Comments
3 min read
The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

Comments
3 min read
Linux Security Checkup: Comprehensive Guide to Quick Audit Essentials

Linux Security Checkup: Comprehensive Guide to Quick Audit Essentials

2
Comments
4 min read
How Java Development Services Ensure Robust Security for Enterprise-Level Applications

How Java Development Services Ensure Robust Security for Enterprise-Level Applications

Comments
7 min read
AWS Centralised Root Access Management : Simplifying Operations

AWS Centralised Root Access Management : Simplifying Operations

3
Comments 1
4 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
Validação e Sanitização em Aplicações Web

Validação e Sanitização em Aplicações Web

Comments
2 min read
Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

Part 4: SQL Injection Series: Real-World Scenarios Deep Dive

5
Comments
4 min read
Fundamentos da Segurança em Aplicações Web

Fundamentos da Segurança em Aplicações Web

Comments
2 min read
Increase Debian based Linux VPS server’s security

Increase Debian based Linux VPS server’s security

Comments
2 min read
Security Management and Advanced Threat Protection

Security Management and Advanced Threat Protection

Comments
2 min read
STRIDE Threat Model 101

STRIDE Threat Model 101

Comments
7 min read
IT Security Risk Management: A Comprehensive Approach to Safeguarding Digital Assets

IT Security Risk Management: A Comprehensive Approach to Safeguarding Digital Assets

Comments
5 min read
🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

🛡️ Cybersecurity for Developers: Protecting Your Code and Systems

Comments
2 min read
Explore: Why PacketSDK is So Concerned about Privacy

Explore: Why PacketSDK is So Concerned about Privacy

Comments
3 min read
AI and Human Monitoring: The Dynamic Duo Against Thefts

AI and Human Monitoring: The Dynamic Duo Against Thefts

Comments
2 min read
How to Test for Security Vulnerabilities Even If You’re Not a Security Expert

How to Test for Security Vulnerabilities Even If You’re Not a Security Expert

Comments
1 min read
Fix Broken Authentication in Laravel: Step-by-Step Guide

Fix Broken Authentication in Laravel: Step-by-Step Guide

Comments
2 min read
Why Using POST for Updates Is Safer Than Hyperlinks

Why Using POST for Updates Is Safer Than Hyperlinks

Comments
2 min read
16 Soruda Blockchain Güvenliği Nedir Ve Nasıl Sağlanır? 🔥

16 Soruda Blockchain Güvenliği Nedir Ve Nasıl Sağlanır? 🔥

Comments
7 min read
Network Security, CDN Technologies and Performance Optimization

Network Security, CDN Technologies and Performance Optimization

1
Comments
69 min read
Cerbos: Fine-Grained Access Control in Days NOT Months

Cerbos: Fine-Grained Access Control in Days NOT Months

11
Comments
8 min read
Harnessing the Power of AWS Security Services

Harnessing the Power of AWS Security Services

Comments
2 min read
AI Summit Vancouver 2024: Exploring AI's Role, Risks, and Transformative Power

AI Summit Vancouver 2024: Exploring AI's Role, Risks, and Transformative Power

Comments
7 min read
Building a SSL Certificate Monitor (to check a validity date)

Building a SSL Certificate Monitor (to check a validity date)

Comments
2 min read
Streamline enterprise customer onboarding with SAML and Clerk

Streamline enterprise customer onboarding with SAML and Clerk

1
Comments
6 min read
How I Accidentally "Hijacked" an npm Package 🚨

How I Accidentally "Hijacked" an npm Package 🚨

1
Comments
2 min read
loading...