DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

7
Comments
5 min read
6 Ways We Get Things Done with Python

6 Ways We Get Things Done with Python

11
Comments
3 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Content-Security-Policy in ASP.NET MVC

Content-Security-Policy in ASP.NET MVC

7
Comments
3 min read
Privacy and Security Series, Part II: Multi-factor Authentication

Privacy and Security Series, Part II: Multi-factor Authentication

6
Comments
9 min read
Exploiting Common Serverless Security Flaws in AWS

Exploiting Common Serverless Security Flaws in AWS

7
Comments 2
11 min read
OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

10
Comments 1
5 min read
Security in CI/CD

Security in CI/CD

8
Comments
1 min read
The Difference Between Malware, Viruses and Ransomware Explained

The Difference Between Malware, Viruses and Ransomware Explained

18
Comments
2 min read
SSL Certificates in Development

SSL Certificates in Development

6
Comments
3 min read
Q Vault: An open source secret manager

Q Vault: An open source secret manager

6
Comments 27
1 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
The Wordpress Security Handbook 2019 - Part 3: Harden your Wordpress installation

The Wordpress Security Handbook 2019 - Part 3: Harden your Wordpress installation

41
Comments 2
4 min read
Explain Blockchain Like I'm Five

Explain Blockchain Like I'm Five

16
Comments 2
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Sneaky Fingerprint and IP Tracker with React

Sneaky Fingerprint and IP Tracker with React

52
Comments 1
4 min read
Possibly Odd Approach for Quick Authentication - User Registry API and Passport

Possibly Odd Approach for Quick Authentication - User Registry API and Passport

31
Comments
6 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

17
Comments
2 min read
The Wordpress Security Handbook 2019 - Part 2: Protect access and sessions

The Wordpress Security Handbook 2019 - Part 2: Protect access and sessions

71
Comments 6
6 min read
Explain User Token Authentication Like I'm Five

Explain User Token Authentication Like I'm Five

12
Comments 3
1 min read
How to Create Role based Authorization Middleware with Casbin and Nest.js

How to Create Role based Authorization Middleware with Casbin and Nest.js

35
Comments
2 min read
Introduction to computer forensics

Introduction to computer forensics

123
Comments 11
5 min read
Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

35
Comments 1
4 min read
Let's Encrypt: Wildcard Certificate With Certbot

Let's Encrypt: Wildcard Certificate With Certbot

133
Comments 27
3 min read
What the heck is OCSP?

What the heck is OCSP?

8
Comments
6 min read
Adding permissions without permission

Adding permissions without permission

10
Comments 4
1 min read
Threat Modelling Serverless

Threat Modelling Serverless

40
Comments 3
5 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
The Wordpress Security Handbook 2019 - Part 1: Protect your files and database

The Wordpress Security Handbook 2019 - Part 1: Protect your files and database

34
Comments 3
6 min read
Hello, Worm!: Mapping SSH probes with a bash script

Hello, Worm!: Mapping SSH probes with a bash script

49
Comments 8
2 min read
Block malicious login attempts, but preventing account lock-outs.

Block malicious login attempts, but preventing account lock-outs.

18
Comments 12
1 min read
Where do you keep credentials for your Lambda functions?

Where do you keep credentials for your Lambda functions?

86
Comments 45
5 min read
Two Factor Authentication 🔏👤

Two Factor Authentication 🔏👤

3
Comments 1
2 min read
Sankaku Complex XSS

Sankaku Complex XSS

6
Comments
2 min read
Tech writing goals for May 2019

Tech writing goals for May 2019

6
Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

11
Comments 1
1 min read
Azure Sentinel: Taking Security To The Next Level

Azure Sentinel: Taking Security To The Next Level

6
Comments
5 min read
Be educated about today's security.

Be educated about today's security.

47
Comments 3
7 min read
Safe Spaces & WoSEC

Safe Spaces & WoSEC

18
Comments 3
2 min read
Password Managers 101 🔑🌐

Password Managers 101 🔑🌐

4
Comments
1 min read
Easy Single Sign-On with Spring Boot and OAuth 2.0

Easy Single Sign-On with Spring Boot and OAuth 2.0

15
Comments
10 min read
Secure your apps with Angular Directive when using target='_blank'

Secure your apps with Angular Directive when using target='_blank'

13
Comments 4
2 min read
Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

6
Comments
18 min read
Is the OAuth 2.0 Implicit Flow Dead?

Is the OAuth 2.0 Implicit Flow Dead?

11
Comments
12 min read
How to improve the security of your Netlify site?

How to improve the security of your Netlify site?

15
Comments 2
2 min read
Spawn a Jenkins from code

Spawn a Jenkins from code

6
Comments 1
7 min read
Building Rootless Applications and Services

Building Rootless Applications and Services

7
Comments 1
6 min read
If Gmail says "Our system has detected that this message does not meet IPv6 sending guidelines regarding PTR records"

If Gmail says "Our system has detected that this message does not meet IPv6 sending guidelines regarding PTR records"

2
Comments
1 min read
Introduction to Linux Hardening

Introduction to Linux Hardening

192
Comments 10
3 min read
Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

44
Comments 9
10 min read
Why is_admin() is totally unsafe for your Wordpress development

Why is_admin() is totally unsafe for your Wordpress development

11
Comments 10
4 min read
Tutorial: Build Universal Applications with Nuxt.js

Tutorial: Build Universal Applications with Nuxt.js

12
Comments
15 min read
“CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter

“CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter

7
Comments
9 min read
What is Helm-Vault?

What is Helm-Vault?

8
Comments 1
2 min read
Detecting Suspicious Nextcloud Logins

Detecting Suspicious Nextcloud Logins

7
Comments 1
6 min read
Recommended way to securely connect to a GraphQL endpoint from a frontend application

Recommended way to securely connect to a GraphQL endpoint from a frontend application

4
Comments 1
1 min read
How to securely build Docker images for Node.js

How to securely build Docker images for Node.js

48
Comments 8
2 min read
User Account Linking in Alexa with ASP.NET Web API

User Account Linking in Alexa with ASP.NET Web API

8
Comments
14 min read
Pushing Left, Like a Boss: Part 4: Secure Coding

Pushing Left, Like a Boss: Part 4: Secure Coding

10
Comments
1 min read
loading...