DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
How create a discipline routine for learn development!

How create a discipline routine for learn development!

3
Comments 1
1 min read
A Practical Guide to AWS IAM

A Practical Guide to AWS IAM

3
Comments 2
1 min read
Secure SDLC and Best Practices for Outsourcing

Secure SDLC and Best Practices for Outsourcing

7
Comments
6 min read
CodeQL Analysis on GitHub

CodeQL Analysis on GitHub

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
Generating a Self Signed Certificate using Powershell

Generating a Self Signed Certificate using Powershell

9
Comments
1 min read
SPFx issues with the new Referrer-Policy in Chrome >= 85

SPFx issues with the new Referrer-Policy in Chrome >= 85

3
Comments
2 min read
All you need to know about TERMUX

All you need to know about TERMUX

24
Comments
2 min read
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

6
Comments 1
2 min read
How to Securely Access The Dark Web in 15 Steps. Second Part

How to Securely Access The Dark Web in 15 Steps. Second Part

8
Comments
9 min read
OAuth 2.0 Resources You Can Actually Understand

OAuth 2.0 Resources You Can Actually Understand

147
Comments 3
3 min read
Scilla, information-gathering tool!

Scilla, information-gathering tool!

3
Comments 1
1 min read
Best Practices for Securing Your REST APIs

Best Practices for Securing Your REST APIs

102
Comments 3
4 min read
5 tips to secure your backend application

5 tips to secure your backend application

8
Comments
3 min read
How to make your MongoDB container more secure?

How to make your MongoDB container more secure?

65
Comments 2
3 min read
How to Prevent Data Loss: 13 Simple Ways

How to Prevent Data Loss: 13 Simple Ways

37
Comments
7 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
CyberSecurity acronyms cheat sheet and dictionary

CyberSecurity acronyms cheat sheet and dictionary

25
Comments
4 min read
Security Matters!! ( SSL )

Security Matters!! ( SSL )

7
Comments
2 min read
ZOOMing in on CISO, Jason Lee

ZOOMing in on CISO, Jason Lee

6
Comments 1
3 min read
Encryption as a Service in Action

Encryption as a Service in Action

9
Comments
5 min read
Abusing the Type System

Abusing the Type System

4
Comments
6 min read
10 Best Practices for Application Security in the Cloud

10 Best Practices for Application Security in the Cloud

7
Comments 1
7 min read
5 server security tips for beginners

5 server security tips for beginners

5
Comments
6 min read
Security best practices on AWS

Security best practices on AWS

23
Comments 2
3 min read
Aerospike Security Events and Audit Logs

Aerospike Security Events and Audit Logs

5
Comments
3 min read
Aerospike Authentication and Authorization

Aerospike Authentication and Authorization

4
Comments
5 min read
Aerospike Data Protection

Aerospike Data Protection

4
Comments
5 min read
Aerospike Network Security

Aerospike Network Security

4
Comments
7 min read
Another Reason to Avoid Constantize in Rails

Another Reason to Avoid Constantize in Rails

7
Comments
5 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
In Which Sarah Learns Web Security: Part Two, Input and Output

In Which Sarah Learns Web Security: Part Two, Input and Output

5
Comments
6 min read
Cracking Spotify Codes and making a quest out of it

Cracking Spotify Codes and making a quest out of it

10
Comments 1
5 min read
Automating deploying Vault, a password manager for your code, with Terraform

Automating deploying Vault, a password manager for your code, with Terraform

10
Comments
9 min read
Running a Graphical Application from a Docker Container - Simply and Securely

Running a Graphical Application from a Docker Container - Simply and Securely

8
Comments
16 min read
Why Firestore Encourages Bad Security

Why Firestore Encourages Bad Security

39
Comments 16
7 min read
Using your Yubikey for Signed Git Commits

Using your Yubikey for Signed Git Commits

18
Comments 4
3 min read
Set up your own VPN with OpenVPN and DigitalOcean

Set up your own VPN with OpenVPN and DigitalOcean

8
Comments 1
3 min read
Use mitmproxy as a personal firewall

Use mitmproxy as a personal firewall

8
Comments 2
3 min read
What is a DDoS attack anyway?

What is a DDoS attack anyway?

10
Comments
5 min read
NodeSecure v0.7.0 and v0.8.0@next

NodeSecure v0.7.0 and v0.8.0@next

6
Comments
3 min read
Using your Yubikey to store your SSH Key (RSA 4096)

Using your Yubikey to store your SSH Key (RSA 4096)

27
Comments 1
4 min read
Security news weekly round-up - 11th September 2020

Security news weekly round-up - 11th September 2020

3
Comments
3 min read
Serving private content from S3 using CloudFront

Serving private content from S3 using CloudFront

3
Comments
7 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
Offline Digital Identity without Internet and Digital ID for Refugees

Offline Digital Identity without Internet and Digital ID for Refugees

6
Comments
4 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
How to Securely Access The Dark Web in 15 Steps. First Part

How to Securely Access The Dark Web in 15 Steps. First Part

7
Comments
8 min read
Everybody hates CSRF

Everybody hates CSRF

37
Comments 3
4 min read
What is TLS? Transport Layer Security encryption explained in plain english

What is TLS? Transport Layer Security encryption explained in plain english

82
Comments 3
5 min read
You've been on a Public Network ? That's bad Security Practice

You've been on a Public Network ? That's bad Security Practice

2
Comments
4 min read
Top 15 Tools for Automating Security in DevOps

Top 15 Tools for Automating Security in DevOps

35
Comments
4 min read
Guide to Cyber Security: learn how to defend your systems

Guide to Cyber Security: learn how to defend your systems

17
Comments
10 min read
Hacking is not black and white!

Hacking is not black and white!

8
Comments
5 min read
The Simplest Way to Authorize Github OAuth Apps with Next.js and Cotter

The Simplest Way to Authorize Github OAuth Apps with Next.js and Cotter

9
Comments
15 min read
Common Biometric Authentication Security Mistakes

Common Biometric Authentication Security Mistakes

5
Comments 1
3 min read
In Which Sarah Learns Web Security: Part One, Introduction and General Principles

In Which Sarah Learns Web Security: Part One, Introduction and General Principles

7
Comments
7 min read
Crack with VSCode Hex Editor

Crack with VSCode Hex Editor

11
Comments
3 min read
Using your Yubikey to get started with GPG

Using your Yubikey to get started with GPG

31
Comments
6 min read
loading...