DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

Just what *is* the /.default scope in the Microsoft identity platform & Azure AD?

23
Comments 1
6 min read
Cryptography for programmers 1: Basics

Cryptography for programmers 1: Basics

468
Comments 10
5 min read
🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

🛡 Install Let's Encrypt Certificate on JBoss WildFly in Linux

10
Comments
3 min read
Accessing Key Vault secrets from an Azure Kubernetes Cluster

Accessing Key Vault secrets from an Azure Kubernetes Cluster

7
Comments
2 min read
TLS and SNI snooping

TLS and SNI snooping

2
Comments
1 min read
Web Dev Wednesday: App Security

Web Dev Wednesday: App Security

6
Comments
1 min read
Como o PHP lida com a questão da segurança

Como o PHP lida com a questão da segurança

9
Comments
2 min read
Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

Understanding OAuth 2 with PKCE in Single-Page Applications (2020)

19
Comments
11 min read
Fixing vulnerabilities in Maven projects

Fixing vulnerabilities in Maven projects

12
Comments
5 min read
Cryptography for programmers 2: Blocks and Randomness

Cryptography for programmers 2: Blocks and Randomness

111
Comments 16
11 min read
What's the best VPN service?

What's the best VPN service?

14
Comments 21
1 min read
Why 2020 Will Be Online Education's Biggest Year

Why 2020 Will Be Online Education's Biggest Year

2
Comments 1
3 min read
Como eu encontrei uma falha na plataforma EAD da Estácio.

Como eu encontrei uma falha na plataforma EAD da Estácio.

18
Comments
3 min read
Establishing and securing a remote connection to Raspberry Pi

Establishing and securing a remote connection to Raspberry Pi

31
Comments 2
10 min read
How do you store private keys?

How do you store private keys?

58
Comments 17
1 min read
Let's talk about Serverless Security – Create:Serverless

Let's talk about Serverless Security – Create:Serverless

20
Comments
3 min read
How important is privacy to you in choosing a cloud provider?

How important is privacy to you in choosing a cloud provider?

2
Comments 4
1 min read
Make your Ubuntu Server VPS more secure against unauthorized access

Make your Ubuntu Server VPS more secure against unauthorized access

23
Comments
10 min read
How-to #1. Data encryption.

How-to #1. Data encryption.

5
Comments
4 min read
Add SSL Cert to Nginx

Add SSL Cert to Nginx

9
Comments
3 min read
VPN Service? Not as secure as they sound

VPN Service? Not as secure as they sound

7
Comments 2
5 min read
Security Headers

Security Headers

8
Comments
1 min read
Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

Your Attackers Won't Be Happy — How GitLab Can Help You Secure Your Cloud-Native Applications!

7
Comments
6 min read
Stricter Access Control to Google Cloud Registry

Stricter Access Control to Google Cloud Registry

4
Comments
3 min read
Essential Docker Container Security Features

Essential Docker Container Security Features

9
Comments 2
4 min read
DangerouslySetInnerHTML in React

DangerouslySetInnerHTML in React

4
Comments
3 min read
CORS & Preflight Request!

CORS & Preflight Request!

25
Comments 3
3 min read
Intro to Security as Code

Intro to Security as Code

6
Comments
8 min read
Security news weekly round-up - 25th September 2020

Security news weekly round-up - 25th September 2020

3
Comments
3 min read
A (secret) way to bypass Chrome's security/privacy error

A (secret) way to bypass Chrome's security/privacy error

21
Comments 1
1 min read
Vaccines for Common SQL Injection Bugs

Vaccines for Common SQL Injection Bugs

4
Comments
2 min read
Can you use Ruby in Bug Bounty?

Can you use Ruby in Bug Bounty?

5
Comments 2
1 min read
How to monitorize program execution on Windows using Wazuh and sysmon.

How to monitorize program execution on Windows using Wazuh and sysmon.

5
Comments
3 min read
Securing our Serverless Apps on Azure

Securing our Serverless Apps on Azure

3
Comments
1 min read
3 sets of Cybersecurity challenges & answers (CTF) to learn from

3 sets of Cybersecurity challenges & answers (CTF) to learn from

28
Comments
2 min read
Why Do Certificate Revocation Checking Mechanisms Never Work?

Why Do Certificate Revocation Checking Mechanisms Never Work?

2
Comments
18 min read
On .NET Episode: Securing Services with MSAL

On .NET Episode: Securing Services with MSAL

11
Comments
1 min read
A Field Guide to CoAP, Part 1

A Field Guide to CoAP, Part 1

5
Comments
8 min read
How to Integrate Security Into a DevOps Cycle

How to Integrate Security Into a DevOps Cycle

13
Comments
5 min read
Are you worried about Security at the Application Layer?

Are you worried about Security at the Application Layer?

9
Comments
4 min read
Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
How create a discipline routine for learn development!

How create a discipline routine for learn development!

3
Comments 1
1 min read
A Practical Guide to AWS IAM

A Practical Guide to AWS IAM

3
Comments 2
1 min read
Secure SDLC and Best Practices for Outsourcing

Secure SDLC and Best Practices for Outsourcing

7
Comments
6 min read
CodeQL Analysis on GitHub

CodeQL Analysis on GitHub

5
Comments
2 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
Generating a Self Signed Certificate using Powershell

Generating a Self Signed Certificate using Powershell

9
Comments
1 min read
SPFx issues with the new Referrer-Policy in Chrome >= 85

SPFx issues with the new Referrer-Policy in Chrome >= 85

3
Comments
2 min read
All you need to know about TERMUX

All you need to know about TERMUX

24
Comments
2 min read
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

6
Comments 1
2 min read
How to Securely Access The Dark Web in 15 Steps. Second Part

How to Securely Access The Dark Web in 15 Steps. Second Part

8
Comments
9 min read
OAuth 2.0 Resources You Can Actually Understand

OAuth 2.0 Resources You Can Actually Understand

147
Comments 3
3 min read
Scilla, information-gathering tool!

Scilla, information-gathering tool!

3
Comments 1
1 min read
Best Practices for Securing Your REST APIs

Best Practices for Securing Your REST APIs

102
Comments 3
4 min read
5 tips to secure your backend application

5 tips to secure your backend application

8
Comments
3 min read
How to make your MongoDB container more secure?

How to make your MongoDB container more secure?

65
Comments 2
3 min read
How to Prevent Data Loss: 13 Simple Ways

How to Prevent Data Loss: 13 Simple Ways

37
Comments
7 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
CyberSecurity acronyms cheat sheet and dictionary

CyberSecurity acronyms cheat sheet and dictionary

25
Comments
4 min read
Security Matters!! ( SSL )

Security Matters!! ( SSL )

7
Comments
2 min read
loading...