DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Create Certificate Authority with AWS Private CA SDK

Create Certificate Authority with AWS Private CA SDK

Comments
4 min read
How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

1
Comments
6 min read
Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Comments
13 min read
AWS Guard Duty

AWS Guard Duty

1
Comments 1
3 min read
HackTheBox - Writeup Keeper [Retired]

HackTheBox - Writeup Keeper [Retired]

2
Comments
5 min read
Secure Password Sharing with my Remote Workers

Secure Password Sharing with my Remote Workers

Comments
5 min read
Real-time Cloud Security Services In The USA | Cloud Optimization

Real-time Cloud Security Services In The USA | Cloud Optimization

Comments
1 min read
Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

2
Comments
3 min read
Issue 41 of AWS Cloud Security Weekly

Issue 41 of AWS Cloud Security Weekly

1
Comments
2 min read
ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

ATLSECCON 2024: Navigating the Future of Cybersecurity in Halifax

1
Comments
6 min read
How Digital Mailroom Solutions Enhance Data Security Measures

How Digital Mailroom Solutions Enhance Data Security Measures

Comments
3 min read
Turning Secure Access Into Child’s Play with Permit Access Request APIs

Turning Secure Access Into Child’s Play with Permit Access Request APIs

Comments
5 min read
How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

Comments
6 min read
Unleashing the Value of Data: A Journey into Data Monetization

Unleashing the Value of Data: A Journey into Data Monetization

1
Comments
2 min read
Cors Workflow

Cors Workflow

Comments
2 min read
eBPF: Unleashing Kernel Magic for Modern Infrastructure

eBPF: Unleashing Kernel Magic for Modern Infrastructure

2
Comments 1
5 min read
Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

2
Comments
2 min read
Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

Comments
2 min read
Content Delivery Network Explained 🌎⚡️

Content Delivery Network Explained 🌎⚡️

1
Comments
4 min read
Security: Why the "XZ backdoor" is worrying

Security: Why the "XZ backdoor" is worrying

2
Comments 2
2 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 6
4 min read
Securing the Cloud #27

Securing the Cloud #27

Comments
2 min read
Security news weekly round-up - 19th April 2024

Security news weekly round-up - 19th April 2024

Comments
2 min read
Data Security and Cryptography on AWS

Data Security and Cryptography on AWS

Comments
3 min read
El Secreto Mejor Guardado de AWS: Protegiendo tu IA Generativa

El Secreto Mejor Guardado de AWS: Protegiendo tu IA Generativa

5
Comments
5 min read
Using Bitcoin and Blockchain ideas to Secure our AI Chatbot

Using Bitcoin and Blockchain ideas to Secure our AI Chatbot

5
Comments 2
9 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Securing Apps In React Native

Securing Apps In React Native

6
Comments
3 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Migrating to Chainguard Images: less CVEs for safer container runtimes

Migrating to Chainguard Images: less CVEs for safer container runtimes

8
Comments 1
3 min read
Block Cipher Design Principles

Block Cipher Design Principles

Comments
1 min read
US government warns against C and C++ code

US government warns against C and C++ code

Comments
4 min read
The XZ attack and timeline

The XZ attack and timeline

23
Comments 3
6 min read
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

1
Comments 1
10 min read
Implementing Secure Authentication with FACEIO: Exploring FACEIO’s Secure Solutions

Implementing Secure Authentication with FACEIO: Exploring FACEIO’s Secure Solutions

1
Comments
11 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

9
Comments
3 min read
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

34
Comments
6 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

8
Comments
11 min read
Self-Paced Online Training for Cyber Security with Expert Support

Self-Paced Online Training for Cyber Security with Expert Support

Comments
3 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
6 security advancements that Plang offers for the user

6 security advancements that Plang offers for the user

Comments
2 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Better Threat Detection with CloudWatch Logs and Generative AI

Better Threat Detection with CloudWatch Logs and Generative AI

1
Comments
6 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images

7
Comments
7 min read
Data Privacy in API Integrations

Data Privacy in API Integrations

1
Comments
5 min read
Don't Keep Up with AI!

Don't Keep Up with AI!

Comments
18 min read
Beyond the login screen

Beyond the login screen

1
Comments
5 min read
Protect API Gateway with Amazon Verified Permissions

Protect API Gateway with Amazon Verified Permissions

3
Comments 1
8 min read
Enhancing AWS Monitoring for Improved Threat Management

Enhancing AWS Monitoring for Improved Threat Management

Comments
2 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
Authentication using JSON Web Tokens.

Authentication using JSON Web Tokens.

8
Comments
4 min read
🔐Simple Yet Crucial step to avoid security incidents💡

🔐Simple Yet Crucial step to avoid security incidents💡

5
Comments
1 min read
loading...