DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Encrypt your notes with GnuPG

Encrypt your notes with GnuPG

5
Comments
2 min read
Authentication & Authorization in Microservices Architecture - Part I

Authentication & Authorization in Microservices Architecture - Part I

381
Comments 28
6 min read
Tryhackme Blue

Tryhackme Blue

3
Comments
1 min read
Exposing sequential IDs is bad! Here is how to avoid it.

Exposing sequential IDs is bad! Here is how to avoid it.

7
Comments 6
4 min read
Stripe for online payments

Stripe for online payments

11
Comments
2 min read
Securely Access QLDB from a Private Subnet

Securely Access QLDB from a Private Subnet

9
Comments 3
3 min read
SSH - Configurations

SSH - Configurations

4
Comments 2
3 min read
Easily Create Allow (or Deny) Lists for Azure Resources

Easily Create Allow (or Deny) Lists for Azure Resources

Comments
3 min read
Account Factory - provision AWS Accounts

Account Factory - provision AWS Accounts

11
Comments
3 min read
Why PASETO is better than JWT for token-based authentication?

Why PASETO is better than JWT for token-based authentication?

170
Comments 8
11 min read
Why you should host public npm packages in a private registry

Why you should host public npm packages in a private registry

14
Comments
4 min read
Announcing the tru.ID CLI

Announcing the tru.ID CLI

7
Comments
7 min read
How react-native-config make my life easier to steal secret keys of your React Native Application

How react-native-config make my life easier to steal secret keys of your React Native Application

5
Comments
1 min read
Less obvious parts of security asymmetries, by Eugene Pilyankevich

Less obvious parts of security asymmetries, by Eugene Pilyankevich

6
Comments
2 min read
Explaining Authentication Security Issues through Memes!

Explaining Authentication Security Issues through Memes!

3
Comments
2 min read
Secure Azure deployments with Bicep and Azure Key Vault

Secure Azure deployments with Bicep and Azure Key Vault

20
Comments
6 min read
Security in Software Development - Part 1

Security in Software Development - Part 1

2
Comments
2 min read
Content Security Policy Header: A Complete Guide

Content Security Policy Header: A Complete Guide

10
Comments
15 min read
JS-X-Ray 3.0

JS-X-Ray 3.0

8
Comments 1
2 min read
Password management on the command line

Password management on the command line

15
Comments 2
5 min read
Why you should use passive vulnerability scan on your website

Why you should use passive vulnerability scan on your website

2
Comments 2
2 min read
Store your Kubernetes Secrets in Git thanks to Kubeseal. Hello SealedSecret!

Store your Kubernetes Secrets in Git thanks to Kubeseal. Hello SealedSecret!

60
Comments 2
6 min read
Writeup: HackTheBox Bashed- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Bashed- Without Metasploit (OSCP Prep)

2
Comments
8 min read
Investigations in Windows on TryHackMe (1)

Investigations in Windows on TryHackMe (1)

8
Comments
4 min read
9 Best Practices & UX improvements for the two-factor authentication (2FA)

9 Best Practices & UX improvements for the two-factor authentication (2FA)

13
Comments
7 min read
Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

5
Comments 3
6 min read
SameSite Cookies and Why You Need Them

SameSite Cookies and Why You Need Them

8
Comments
7 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

20
Comments 1
5 min read
Putting Security in DevOps

Putting Security in DevOps

1
Comments
1 min read
Stop using your AWS Account root user

Stop using your AWS Account root user

17
Comments 2
3 min read
Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova 03:26

Why security, encryption, and privacy are not the same thing, by Anastasiia Voitova

7
Comments
1 min read
Using Cloudflare to serve your private Azure Storage Blobs

Using Cloudflare to serve your private Azure Storage Blobs

4
Comments
3 min read
Web Application Security Checklist (2021)

Web Application Security Checklist (2021)

232
Comments 2
44 min read
When should my startup prioritize infosec?

When should my startup prioritize infosec?

2
Comments
3 min read
Scan AWS IAM Keys In A Commit

Scan AWS IAM Keys In A Commit

8
Comments
2 min read
fail2ban: block ssh bruteforce attacks 🇬🇧

fail2ban: block ssh bruteforce attacks 🇬🇧

8
Comments
4 min read
Observability of software design - What it is and why it matters

Observability of software design - What it is and why it matters

24
Comments
5 min read
Bandit CTF — 6 to 10 Challenges Writeup

Bandit CTF — 6 to 10 Challenges Writeup

2
Comments
2 min read
IdentityServer4,ASP.NET Identity for Authentication & Authorization with ReactJS client

IdentityServer4,ASP.NET Identity for Authentication & Authorization with ReactJS client

17
Comments 4
3 min read
The Pitfalls of Employee Tracking In The Age Of Remote Working

The Pitfalls of Employee Tracking In The Age Of Remote Working

19
Comments 6
9 min read
Dando permissões a usuários com Kubernetes

Dando permissões a usuários com Kubernetes

7
Comments
9 min read
Hashing Password combining with Salt in C# and VB.NET

Hashing Password combining with Salt in C# and VB.NET

11
Comments 4
2 min read
Know The Web: SOP (Same Origin Policy)

Know The Web: SOP (Same Origin Policy)

4
Comments
4 min read
An understanding of Spring Security

An understanding of Spring Security

2
Comments
1 min read
CSS Lint for Target _blank, noopener and noreferrer

CSS Lint for Target _blank, noopener and noreferrer

5
Comments
2 min read
Implement RBAC on Azure Key Vault

Implement RBAC on Azure Key Vault

10
Comments
2 min read
Hashing and why it is useful

Hashing and why it is useful

16
Comments
3 min read
Digital resilience: redundancy for websites and communications

Digital resilience: redundancy for websites and communications

2
Comments
5 min read
XSS (Cross-Site Scripting) Attacks & Prevention

XSS (Cross-Site Scripting) Attacks & Prevention

23
Comments
10 min read
Trivy: scanning your containers for vulnerabilities

Trivy: scanning your containers for vulnerabilities

2
Comments
5 min read
My web security learnings: Cross-Site Scripting.

My web security learnings: Cross-Site Scripting.

16
Comments
3 min read
Apie CityBee ir slaptažodžių saugumą

Apie CityBee ir slaptažodžių saugumą

22
Comments 11
11 min read
How to Generate a Secure Random Number in Node.js

How to Generate a Secure Random Number in Node.js

12
Comments 4
2 min read
Control your npm packages & avoid dependency confusion

Control your npm packages & avoid dependency confusion

24
Comments 1
4 min read
7 Tips to Secure your Docker Container

7 Tips to Secure your Docker Container

10
Comments
5 min read
Firewall for Applications in Kubernetes

Firewall for Applications in Kubernetes

4
Comments
3 min read
Keeping your Node.js projects secure with CI/CD

Keeping your Node.js projects secure with CI/CD

5
Comments
3 min read
Testing certificates generated by Traefik and Let's Encrypt 🔏

Testing certificates generated by Traefik and Let's Encrypt 🔏

5
Comments
5 min read
Know The Web: HTTP Cookie 🍪

Know The Web: HTTP Cookie 🍪

77
Comments 3
7 min read
Solve SECURITY Issues - a DevOps Perspective

Solve SECURITY Issues - a DevOps Perspective

6
Comments 1
2 min read
loading...