DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Signing and Validating JSON Web Tokens (JWT) For Everyone

Signing and Validating JSON Web Tokens (JWT) For Everyone

139
Comments 16
10 min read
What is Cyber Security

What is Cyber Security

7
Comments
2 min read
Node.js Resiliency Concepts: Recovery and Self-Healing

Node.js Resiliency Concepts: Recovery and Self-Healing

61
Comments
17 min read
Dockerfile Security Best Practices

Dockerfile Security Best Practices

8
Comments
5 min read
A visual introduction to AWS Lambda permissions

A visual introduction to AWS Lambda permissions

48
Comments 2
8 min read
Message Integrity, Authentication, and Non-Repudiation

Message Integrity, Authentication, and Non-Repudiation

6
Comments
4 min read
The Aura App & Physical ERD's: Getting Things in Order

The Aura App & Physical ERD's: Getting Things in Order

2
Comments
3 min read
Using JWT Token/Cookie based session authentication — Potential Identity Theft & Data Exploitation

Using JWT Token/Cookie based session authentication — Potential Identity Theft & Data Exploitation

2
Comments 3
2 min read
COMO CRIAR UMA SENHA SEGURA

COMO CRIAR UMA SENHA SEGURA

2
Comments
3 min read
What is a JWT token

What is a JWT token

44
Comments 4
3 min read
Generating pentest reports with Reconmap

Generating pentest reports with Reconmap

6
Comments
3 min read
To improve good security practices

To improve good security practices

7
Comments
1 min read
A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

A Study Guide to prepare for Kubernetes Security Specialist Certificate (CKSS)

11
Comments
2 min read
GitHub Thrilled : Code scanning is now available!

GitHub Thrilled : Code scanning is now available!

12
Comments
1 min read
Microsoft September 2020 Patch Tuesday

Microsoft September 2020 Patch Tuesday

3
Comments
2 min read
Making Sense of the SOAR Cybersecurity Product Space

Making Sense of the SOAR Cybersecurity Product Space

2
Comments
7 min read
Adding SSL to our Azure Node app

Adding SSL to our Azure Node app

11
Comments
4 min read
CLAD Model for Serverless Security

CLAD Model for Serverless Security

26
Comments
11 min read
Node Package Manager (NPM) Audit and what that means!

Node Package Manager (NPM) Audit and what that means!

3
Comments
3 min read
CrowdSec, an open-source, modernized & collaborative Fail2ban

CrowdSec, an open-source, modernized & collaborative Fail2ban

37
Comments 8
3 min read
How to hide secrets in an image using Python

How to hide secrets in an image using Python

10
Comments
3 min read
Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

23
Comments 1
6 min read
Cryptography for programmers 1: Basics

Cryptography for programmers 1: Basics

468
Comments 10
5 min read
🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

10
Comments
3 min read
Accessing Key Vault secrets from an Azure Kubernetes Cluster

Accessing Key Vault secrets from an Azure Kubernetes Cluster

7
Comments
2 min read
TLS and SNI snooping

TLS and SNI snooping

2
Comments
1 min read
Web Dev Wednesday: App Security

Web Dev Wednesday: App Security

6
Comments
1 min read
Como o PHP lida com a questão da segurança

Como o PHP lida com a questão da segurança

9
Comments
2 min read
Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

19
Comments
11 min read
Cryptography for programmers 2: Blocks and Randomness

Cryptography for programmers 2: Blocks and Randomness

111
Comments 16
11 min read
Fixing vulnerabilities in Maven projects

Fixing vulnerabilities in Maven projects

12
Comments
5 min read
What's the best VPN service?

What's the best VPN service?

14
Comments 21
1 min read
Como eu encontrei uma falha na plataforma EAD da Estácio.

Como eu encontrei uma falha na plataforma EAD da Estácio.

15
Comments
3 min read
Establishing and securing a remote connection to Raspberry Pi

Establishing and securing a remote connection to Raspberry Pi

31
Comments 2
10 min read
How do you store private keys?

How do you store private keys?

58
Comments 17
1 min read
Let's talk about Serverless Security – Create:Serverless

Let's talk about Serverless Security – Create:Serverless

20
Comments
3 min read
How important is privacy to you in choosing a cloud provider?

How important is privacy to you in choosing a cloud provider?

2
Comments 4
1 min read
Make your Ubuntu Server VPS more secure against unauthorized access

Make your Ubuntu Server VPS more secure against unauthorized access

23
Comments
10 min read
How-to #1. Data encryption.

How-to #1. Data encryption.

5
Comments
4 min read
Add SSL Cert to Nginx

Add SSL Cert to Nginx

9
Comments
3 min read
VPN Service? Not as secure as they sound

VPN Service? Not as secure as they sound

7
Comments 2
5 min read
Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

7
Comments
6 min read
Security Headers

Security Headers

8
Comments
1 min read
Stricter Access Control to Google Cloud Registry

Stricter Access Control to Google Cloud Registry

4
Comments
3 min read
Essential Docker Container Security Features

Essential Docker Container Security Features

9
Comments 2
4 min read
DangerouslySetInnerHTML in React

DangerouslySetInnerHTML in React

4
Comments
3 min read
CORS & Preflight Request!

CORS & Preflight Request!

25
Comments 3
3 min read
Intro to Security as Code

Intro to Security as Code

6
Comments
8 min read
Security news weekly round-up - 25th September 2020

Security news weekly round-up - 25th September 2020

3
Comments
3 min read
A (secret) way to bypass Chrome's security/privacy error

A (secret) way to bypass Chrome's security/privacy error

19
Comments 1
1 min read
Vaccines for Common SQL Injection Bugs

Vaccines for Common SQL Injection Bugs

4
Comments
2 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

5
Comments 2
1 min read
How to monitorize program execution on Windows using Wazuh and sysmon.

How to monitorize program execution on Windows using Wazuh and sysmon.

5
Comments
3 min read
Securing our Serverless Apps on Azure

Securing our Serverless Apps on Azure

3
Comments
1 min read
3 sets of Cybersecurity challenges & answers (CTF) to learn from

3 sets of Cybersecurity challenges & answers (CTF) to learn from

28
Comments
2 min read
Why Do Certificate Revocation Checking Mechanisms Never Work?

Why Do Certificate Revocation Checking Mechanisms Never Work?

2
Comments
18 min read
On .NET Episode: Securing Services with MSAL

On .NET Episode: Securing Services with MSAL

11
Comments
1 min read
A Field Guide to CoAP, Part 1

A Field Guide to CoAP, Part 1

5
Comments
8 min read
How to Integrate Security Into a DevOps Cycle

How to Integrate Security Into a DevOps Cycle

13
Comments
5 min read
Are you worried about Security at the Application Layer?

Are you worried about Security at the Application Layer?

9
Comments
4 min read
loading...