DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS Identity Access Management – IAM Overview

AWS Identity Access Management – IAM Overview

3
Comments
3 min read
How much does the CompTIA Security+ Certification Cost?

How much does the CompTIA Security+ Certification Cost?

2
Comments
4 min read
Lots of great stuff brewing at Redis University!

Lots of great stuff brewing at Redis University!

6
Comments
1 min read
Create a server with PostgreSQL in Go - Part[1/3] of Go Authentication series

Create a server with PostgreSQL in Go - Part[1/3] of Go Authentication series

85
Comments
5 min read
🚀 Writing secure React Native app

🚀 Writing secure React Native app

12
Comments
2 min read
Updating Dev Spam Filter is needed

Updating Dev Spam Filter is needed

4
Comments 8
1 min read
How to Properly Manage Application Secrets (From Beginner to Expert!) 🔐

How to Properly Manage Application Secrets (From Beginner to Expert!) 🔐

29
Comments 1
1 min read
Vestigo v0.5.0 - Tales of Port Scans

Vestigo v0.5.0 - Tales of Port Scans

8
Comments
2 min read
How to secure and ensure the internet-facing application load balancer only allow traffic from CloudFront?

How to secure and ensure the internet-facing application load balancer only allow traffic from CloudFront?

12
Comments 2
2 min read
OpenSource and Data Privacy.

OpenSource and Data Privacy.

37
Comments
6 min read
Why 2020 Will Be Online Education's Biggest Year

Why 2020 Will Be Online Education's Biggest Year

2
Comments
3 min read
Creating Login and Private Routes with Refreshing tokens - Part[3/3] of Go Authentication series

Creating Login and Private Routes with Refreshing tokens - Part[3/3] of Go Authentication series

35
Comments 4
4 min read
Creating JWT's and SignUp Route - Part[2/3] of Go Authentication series

Creating JWT's and SignUp Route - Part[2/3] of Go Authentication series

31
Comments 3
7 min read
Content Security Policy - protect your website from XSS attacks

Content Security Policy - protect your website from XSS attacks

30
Comments 1
3 min read
Steganography [ folder -> image ]

Steganography [ folder -> image ]

29
Comments 1
5 min read
Check vulnerabilities for WordPress in your local network with Docker and WPScan

Check vulnerabilities for WordPress in your local network with Docker and WPScan

8
Comments
3 min read
Cyptography for Beginners

Cyptography for Beginners

269
Comments 2
5 min read
Google drops bombshell zero day exploit affecting Windows 10

Google drops bombshell zero day exploit affecting Windows 10

6
Comments
2 min read
Upgrade SSH Client Keys and Remote Servers after Fedora 33's New Crypto Policy

Upgrade SSH Client Keys and Remote Servers after Fedora 33's New Crypto Policy

16
Comments 1
5 min read
PHP: Few Good Practices

PHP: Few Good Practices

6
Comments
6 min read
Create your own version of ProtonMail.

Create your own version of ProtonMail.

9
Comments
4 min read
Block IPs on all ports with fail2ban on a docker host

Block IPs on all ports with fail2ban on a docker host

7
Comments
1 min read
Introducing Semgrep and r2c

Introducing Semgrep and r2c

2
Comments
4 min read
DevSecOps with Azure DevOps

DevSecOps with Azure DevOps

30
Comments
13 min read
JHipster security scanning

JHipster security scanning

3
Comments
1 min read
SaaS Security Checklist: Best Practices for Protecting SaaS Apps

SaaS Security Checklist: Best Practices for Protecting SaaS Apps

31
Comments 2
4 min read
How to use cookies to store secrets in Postman

How to use cookies to store secrets in Postman

8
Comments
3 min read
Integrate Azure AD with Firebase and call MS Graph in a Node.js app

Integrate Azure AD with Firebase and call MS Graph in a Node.js app

14
Comments 8
6 min read
Why I wrote a Serverless Security book

Why I wrote a Serverless Security book

3
Comments 2
5 min read
Your javascript can reveal your secrets

Your javascript can reveal your secrets

22
Comments
3 min read
How an SRE became an Application Security Engineer (and you can too)

How an SRE became an Application Security Engineer (and you can too)

6
Comments
8 min read
Skip macOS Catalina security check

Skip macOS Catalina security check

8
Comments
2 min read
Uncovering critical data access using AppMaps

Uncovering critical data access using AppMaps

16
Comments
2 min read
Tenha privacidade total com sua própria VPN hospedada na cloud

Tenha privacidade total com sua própria VPN hospedada na cloud

14
Comments
16 min read
What are the BENEFITS of DevOps?

What are the BENEFITS of DevOps?

18
Comments 1
5 min read
API Security Best Practices

API Security Best Practices

1325
Comments 8
5 min read
Using fine grained access control for search

Using fine grained access control for search

6
Comments
6 min read
Can a Windows wallpaper really hijack your Microsoft account password?

Can a Windows wallpaper really hijack your Microsoft account password?

5
Comments
4 min read
The power of http headers and 4 examples you did not know before

The power of http headers and 4 examples you did not know before

111
Comments 1
6 min read
Express limit rate API request

Express limit rate API request

2
Comments
1 min read
President Trump’s Twitter accessed by security expert who guessed password "maga2020!"

President Trump’s Twitter accessed by security expert who guessed password "maga2020!"

32
Comments 15
1 min read
Secure Configuration of Web Application Firewalls

Secure Configuration of Web Application Firewalls

18
Comments
2 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

4
Comments
2 min read
Diffie–Hellman key exchange

Diffie–Hellman key exchange

4
Comments
3 min read
Can Security Teams Benefit from SRE? You bet!

Can Security Teams Benefit from SRE? You bet!

3
Comments
6 min read
How to find and delete idle GCP Projects

How to find and delete idle GCP Projects

2
Comments
4 min read
Security news weekly round-up - 23rd October 2020

Security news weekly round-up - 23rd October 2020

4
Comments
3 min read
Cheap and safe webcam cover for MacBook Pro

Cheap and safe webcam cover for MacBook Pro

3
Comments 1
2 min read
AuthN vs AuthZ

AuthN vs AuthZ

3
Comments
2 min read
SnykCon - Making Sense of Container Security with Snyk CLI and GitHub Actions

SnykCon - Making Sense of Container Security with Snyk CLI and GitHub Actions

12
Comments
7 min read
Prevent phishing attack when open a new webpage from your project code

Prevent phishing attack when open a new webpage from your project code

9
Comments 1
2 min read
The Need for Cyber Security in Organizations

The Need for Cyber Security in Organizations

5
Comments
3 min read
Infrastructure as code leads to Security as code

Infrastructure as code leads to Security as code

11
Comments
5 min read
Tasks that require root user

Tasks that require root user

6
Comments
4 min read
How Can I Protect My WordPress Website from Hacking?

How Can I Protect My WordPress Website from Hacking?

3
Comments
4 min read
Three rules for choosing a VPN that takes your privacy seriously

Three rules for choosing a VPN that takes your privacy seriously

27
Comments 6
6 min read
Simple tips to nail DevOps practice

Simple tips to nail DevOps practice

3
Comments
2 min read
Kali Linux on iPad

Kali Linux on iPad

10
Comments
5 min read
Public vs Private disclosure

Public vs Private disclosure

3
Comments 1
1 min read
The Myth of False Positives in Static Application Security Testing

The Myth of False Positives in Static Application Security Testing

8
Comments
5 min read
loading...