DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What Was GCHQ's Project Tempora? Is This Still Was?

What Was GCHQ's Project Tempora? Is This Still Was?

2
Comments
13 min read
Laravel Application Security

Laravel Application Security

Comments 1
2 min read
Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

1
Comments
9 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
New tools for effortless policy creation and testing in Cerbos Hub

New tools for effortless policy creation and testing in Cerbos Hub

Comments
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

4
Comments
4 min read
Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

4
Comments 1
4 min read
Identity Management: The Foundation for Security Implementation

Identity Management: The Foundation for Security Implementation

8
Comments 1
5 min read
AI Security: How to Protect Your Projects with Hardened ModelKits

AI Security: How to Protect Your Projects with Hardened ModelKits

45
Comments
7 min read
Storing passwords safely (C#)

Storing passwords safely (C#)

55
Comments 26
6 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

1
Comments
3 min read
Hacking (and securing) GraphQL

Hacking (and securing) GraphQL

2
Comments
13 min read
Leverage IP Data for Dynamic User Access Management 🌐

Leverage IP Data for Dynamic User Access Management 🌐

46
Comments 1
4 min read
AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

7
Comments
6 min read
Greatly improve your Health Endpoint with these tips!

Greatly improve your Health Endpoint with these tips!

1
Comments
2 min read
The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

Comments
2 min read
The Dynamic Application Security Testing Process: A Step-by-Step Guide

The Dynamic Application Security Testing Process: A Step-by-Step Guide

Comments
4 min read
Why you should not mistype a website name ?

Why you should not mistype a website name ?

12
Comments
1 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
SSL Pinning in React Native for iOS and Android

SSL Pinning in React Native for iOS and Android

10
Comments
4 min read
Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

2
Comments
1 min read
Enhancing data security with FIM (file integrity monitoring) 🔐

Enhancing data security with FIM (file integrity monitoring) 🔐

1
Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

7
Comments
4 min read
How I Secured My Containerized Application Using Anchore (Day 29 Project)

How I Secured My Containerized Application Using Anchore (Day 29 Project)

Comments
3 min read
What Is WebAuthN: A Developer's Guide To WebAuthN

What Is WebAuthN: A Developer's Guide To WebAuthN

Comments
6 min read
Learn about basic Authentication

Learn about basic Authentication

2
Comments
4 min read
Ten Must-Have Endpoint Security Tools for 2025

Ten Must-Have Endpoint Security Tools for 2025

Comments
2 min read
Issue 66 of AWS Cloud Security Weekly

Issue 66 of AWS Cloud Security Weekly

1
Comments
1 min read
K8s Plugins For Solid Security

K8s Plugins For Solid Security

Comments
2 min read
Hidden Risk Of Relying On Labels In Kubernetes Security

Hidden Risk Of Relying On Labels In Kubernetes Security

Comments
2 min read
Whats Information Security?

Whats Information Security?

Comments
1 min read
Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash: A Robust Module for Secure Password Hashing

4
Comments
3 min read
Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

1
Comments
1 min read
Understanding Git Tags and Checkout

Understanding Git Tags and Checkout

9
Comments 1
7 min read
Automating Vulnerability Detection for Your Assets

Automating Vulnerability Detection for Your Assets

Comments
13 min read
Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

2
Comments
4 min read
🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

137
Comments 9
6 min read
How to Safely Delete Local and Remote Branches in Git

How to Safely Delete Local and Remote Branches in Git

8
Comments 1
5 min read
Bypassing Bot Detection Software with Selenium in Python

Bypassing Bot Detection Software with Selenium in Python

5
Comments
2 min read
TLS vs SSL

TLS vs SSL

Comments
2 min read
Protecting Your Application with CSRF in Lithe

Protecting Your Application with CSRF in Lithe

4
Comments
4 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
The Rise of AI in Cybersecurity: Opportunities and Challenges

The Rise of AI in Cybersecurity: Opportunities and Challenges

1
Comments 2
2 min read
Node.js Authentication: Best Practices and Key Strategies

Node.js Authentication: Best Practices and Key Strategies

40
Comments 6
6 min read
Defensive Programming as a Backend Developer: Building Robust and Secure Systems

Defensive Programming as a Backend Developer: Building Robust and Secure Systems

21
Comments 1
11 min read
Understanding "working-directory" in GitHub Actions

Understanding "working-directory" in GitHub Actions

8
Comments
3 min read
Issue 67 of AWS Cloud Security Weekly

Issue 67 of AWS Cloud Security Weekly

1
Comments
1 min read
CornCon X: Powering Cybersecurity Innovation Through Human Connection

CornCon X: Powering Cybersecurity Innovation Through Human Connection

3
Comments 1
8 min read
Streamline Keyper CI/CD Pipeline with Keyper's Github Action

Streamline Keyper CI/CD Pipeline with Keyper's Github Action

1
Comments
4 min read
Advanced JWT Exploitation Techniques: Going Beyond the Basics

Advanced JWT Exploitation Techniques: Going Beyond the Basics

1
Comments
5 min read
Issue 70 of AWS Cloud Security Weekly

Issue 70 of AWS Cloud Security Weekly

3
Comments 2
2 min read
Advanced Container Security Techniques for DevSecOps Pipelines

Advanced Container Security Techniques for DevSecOps Pipelines

1
Comments
6 min read
Addressing The Threat of Deepfakes With Authentic Images

Addressing The Threat of Deepfakes With Authentic Images

Comments
8 min read
Security news weekly round-up - 1st November 2024

Security news weekly round-up - 1st November 2024

1
Comments
4 min read
Automating CI/CD Pipeline Migration with GitHub Actions Importer

Automating CI/CD Pipeline Migration with GitHub Actions Importer

7
Comments
5 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

8
Comments
4 min read
Who is a Hacker?

Who is a Hacker?

7
Comments
8 min read
The Ultimate Guide to Protecting Your Online Privacy in 2024

The Ultimate Guide to Protecting Your Online Privacy in 2024

2
Comments 2
3 min read
Serverless AI powered content moderation service

Serverless AI powered content moderation service

3
Comments
6 min read
Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Comments
3 min read
loading...