DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Using Bitcoin and Blockchain ideas to Secure our AI Chatbot

Using Bitcoin and Blockchain ideas to Secure our AI Chatbot

1
Comments
9 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Securing Apps In React Native

Securing Apps In React Native

Comments
3 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
US government warns against C and C++ code

US government warns against C and C++ code

Comments
4 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
Enhancing AWS Monitoring for Improved Threat Management

Enhancing AWS Monitoring for Improved Threat Management

Comments
2 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
Securing Your Web Application with AWS WAF and AWS Shield

Securing Your Web Application with AWS WAF and AWS Shield

Comments
5 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

7
Comments
11 min read
Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

1
Comments
6 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
The XZ attack and timeline

The XZ attack and timeline

21
Comments 3
6 min read
Gerenciando informações e eventos de segurança - SIEM

Gerenciando informações e eventos de segurança - SIEM

1
Comments
3 min read
Locally test and validate your Renovate configuration files

Locally test and validate your Renovate configuration files

Comments
3 min read
"Keep everything online"

"Keep everything online"

Comments
3 min read
Data Privacy in API Integrations

Data Privacy in API Integrations

Comments
5 min read
Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Comments
5 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Infrastructure protection on AWS for Beginners

Infrastructure protection on AWS for Beginners

Comments
7 min read
Security news weekly round-up - 5th April 2024

Security news weekly round-up - 5th April 2024

1
Comments
3 min read
Migrating to Chainguard Images: less CVEs for safer container runtimes

Migrating to Chainguard Images: less CVEs for safer container runtimes

7
Comments
3 min read
🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

Comments
2 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

1
Comments
3 min read
GitHub: signing commit in a workflow

GitHub: signing commit in a workflow

2
Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
Fortress GitHub: Building a Secure Organization

Fortress GitHub: Building a Secure Organization

Comments
6 min read
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

1
Comments 1
10 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

Comments
5 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
API Security Best Practices: Enable Good Governance

API Security Best Practices: Enable Good Governance

Comments
6 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
How to know if you have the XZ vulnerability and what you can do about it

How to know if you have the XZ vulnerability and what you can do about it

Comments
2 min read
Social media authentication: convenience vs privacy

Social media authentication: convenience vs privacy

1
Comments
5 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
Security fundamentals: buffer overflow

Security fundamentals: buffer overflow

Comments
14 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
10 Common Mistakes in Developing Video Conferencing Apps for Developers

10 Common Mistakes in Developing Video Conferencing Apps for Developers

Comments
9 min read
6 security advancements that Plang offers for the user

6 security advancements that Plang offers for the user

Comments
2 min read
GitHub: Personal Access Tokens

GitHub: Personal Access Tokens

Comments
5 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

32
Comments
6 min read
Security news weekly round-up - 29th March 2024

Security news weekly round-up - 29th March 2024

Comments
4 min read
loading...