DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Create your own version of ProtonMail.

Create your own version of ProtonMail.

9
Comments
4 min read
Block IPs on all ports with fail2ban on a docker host

Block IPs on all ports with fail2ban on a docker host

7
Comments
1 min read
Introducing Semgrep and r2c

Introducing Semgrep and r2c

2
Comments
4 min read
DevSecOps with Azure DevOps

DevSecOps with Azure DevOps

31
Comments
13 min read
JHipster security scanning

JHipster security scanning

3
Comments
1 min read
SaaS Security Checklist: Best Practices for Protecting SaaS Apps

SaaS Security Checklist: Best Practices for Protecting SaaS Apps

31
Comments 2
4 min read
How to use cookies to store secrets in Postman

How to use cookies to store secrets in Postman

8
Comments
3 min read
Integrate Azure AD with Firebase and call MS Graph in a Node.js app

Integrate Azure AD with Firebase and call MS Graph in a Node.js app

14
Comments 8
6 min read
Why I wrote a Serverless Security book

Why I wrote a Serverless Security book

3
Comments 2
5 min read
Your javascript can reveal your secrets

Your javascript can reveal your secrets

22
Comments
3 min read
How an SRE became an Application Security Engineer (and you can too)

How an SRE became an Application Security Engineer (and you can too)

6
Comments
8 min read
Skip macOS Catalina security check

Skip macOS Catalina security check

8
Comments
2 min read
Uncovering critical data access using AppMaps

Uncovering critical data access using AppMaps

16
Comments
2 min read
Tenha privacidade total com sua própria VPN hospedada na cloud

Tenha privacidade total com sua própria VPN hospedada na cloud

14
Comments
16 min read
What are the BENEFITS of DevOps?

What are the BENEFITS of DevOps?

18
Comments 1
5 min read
API Security Best Practices

API Security Best Practices

1325
Comments 8
5 min read
Using fine grained access control for search

Using fine grained access control for search

6
Comments
6 min read
Can a Windows wallpaper really hijack your Microsoft account password?

Can a Windows wallpaper really hijack your Microsoft account password?

5
Comments
4 min read
The power of http headers and 4 examples you did not know before

The power of http headers and 4 examples you did not know before

111
Comments 1
6 min read
Express limit rate API request

Express limit rate API request

2
Comments
1 min read
President Trump’s Twitter accessed by security expert who guessed password "maga2020!"

President Trump’s Twitter accessed by security expert who guessed password "maga2020!"

32
Comments 15
1 min read
Secure Configuration of Web Application Firewalls

Secure Configuration of Web Application Firewalls

18
Comments
2 min read
RSA & How to Create encryption key?

RSA & How to Create encryption key?

4
Comments
2 min read
Diffie–Hellman key exchange

Diffie–Hellman key exchange

4
Comments
3 min read
Can Security Teams Benefit from SRE? You bet!

Can Security Teams Benefit from SRE? You bet!

3
Comments
6 min read
How to find and delete idle GCP Projects

How to find and delete idle GCP Projects

2
Comments
4 min read
Security news weekly round-up - 23rd October 2020

Security news weekly round-up - 23rd October 2020

4
Comments
3 min read
Cheap and safe webcam cover for MacBook Pro

Cheap and safe webcam cover for MacBook Pro

3
Comments 1
2 min read
AuthN vs AuthZ

AuthN vs AuthZ

3
Comments
2 min read
SnykCon - Making Sense of Container Security with Snyk CLI and GitHub Actions

SnykCon - Making Sense of Container Security with Snyk CLI and GitHub Actions

12
Comments
7 min read
Prevent phishing attack when open a new webpage from your project code

Prevent phishing attack when open a new webpage from your project code

9
Comments 1
2 min read
The Need for Cyber Security in Organizations

The Need for Cyber Security in Organizations

5
Comments
3 min read
Infrastructure as code leads to Security as code

Infrastructure as code leads to Security as code

11
Comments
5 min read
Tasks that require root user

Tasks that require root user

6
Comments
4 min read
How Can I Protect My WordPress Website from Hacking?

How Can I Protect My WordPress Website from Hacking?

3
Comments
4 min read
Three rules for choosing a VPN that takes your privacy seriously

Three rules for choosing a VPN that takes your privacy seriously

27
Comments 6
6 min read
Simple tips to nail DevOps practice

Simple tips to nail DevOps practice

3
Comments
2 min read
Kali Linux on iPad

Kali Linux on iPad

10
Comments
5 min read
Public vs Private disclosure

Public vs Private disclosure

3
Comments 1
1 min read
The Myth of False Positives in Static Application Security Testing

The Myth of False Positives in Static Application Security Testing

8
Comments
5 min read
Privacy and Ethical Web Analytics

Privacy and Ethical Web Analytics

4
Comments
4 min read
stegbrute - Fast Steganography brute-force tool

stegbrute - Fast Steganography brute-force tool

9
Comments
3 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

7
Comments
8 min read
Basic Authentication with Lambda@Edge

Basic Authentication with Lambda@Edge

34
Comments 5
3 min read
Choosing the right access control strategy

Choosing the right access control strategy

14
Comments
7 min read
The user authentication deserve more attention

The user authentication deserve more attention

2
Comments 1
1 min read
Generating Django QuerySet filters from oso policies

Generating Django QuerySet filters from oso policies

2
Comments
1 min read
Anonymity of Bitcoin by mixing

Anonymity of Bitcoin by mixing

2
Comments
3 min read
How Stripe is actioning the osquery API at scale [osquery@scale]

How Stripe is actioning the osquery API at scale [osquery@scale]

2
Comments
2 min read
Security news weekly round-up - 16th October 2020

Security news weekly round-up - 16th October 2020

2
Comments
3 min read
We Need To Talk About API Security

We Need To Talk About API Security

71
Comments 9
6 min read
End-to-End Encrypted Chat with the Web Crypto API

End-to-End Encrypted Chat with the Web Crypto API

255
Comments 19
9 min read
Check out my new project!

Check out my new project!

3
Comments
1 min read
Spam sucks

Spam sucks

139
Comments 38
2 min read
Crack WPA/WPA2 Wi-fi Password

Crack WPA/WPA2 Wi-fi Password

7
Comments 1
5 min read
5 things you should do right now to secure SSH access to your server

5 things you should do right now to secure SSH access to your server

21
Comments
4 min read
Cryptography for programmers 3: Hashes, MACs & JWT

Cryptography for programmers 3: Hashes, MACs & JWT

28
Comments 6
9 min read
GraphQL in Production with Hasura Cloud

GraphQL in Production with Hasura Cloud

5
Comments
11 min read
Code security: evaluation of the new Github code scanning function

Code security: evaluation of the new Github code scanning function

8
Comments 2
4 min read
Simple and Secure Web Login with Azure Identity

Simple and Secure Web Login with Azure Identity

8
Comments
2 min read
loading...