DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is JWT (Json Web Token)

What is JWT (Json Web Token)

Comments
2 min read
Clean authorization control in serverless functions

Clean authorization control in serverless functions

34
Comments 1
4 min read
Adding a Privacy Layer to AWS PartyRock

Adding a Privacy Layer to AWS PartyRock

10
Comments
9 min read
Passwords vs Keys

Passwords vs Keys

2
Comments
2 min read
Explore web applications through their content security policy (CSP)

Explore web applications through their content security policy (CSP)

8
Comments
5 min read
HasMySecretLeaked - Building a Trustless and Secure Protocol

HasMySecretLeaked - Building a Trustless and Secure Protocol

12
Comments
8 min read
Demystifying IP Addresses with is.ipv4 and is.not_ipv4 from 'thiis': Your Friendly Guide to IP Validation

Demystifying IP Addresses with is.ipv4 and is.not_ipv4 from 'thiis': Your Friendly Guide to IP Validation

Comments 1
5 min read
Top 5 Posts tagged(#react) last week

Top 5 Posts tagged(#react) last week

Comments 1
2 min read
Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Securing Kubernetes: Adding a new hostname or IP address to Kubernetes API Server

Comments 1
5 min read
IP Address

IP Address

18
Comments 3
4 min read
Azure Data Storage Solutions: Enhancing Performance & Security for Cloud Architects

Azure Data Storage Solutions: Enhancing Performance & Security for Cloud Architects

1
Comments
2 min read
Code Security Best Practices: Protecting Your Projects When Collaborating and Using AI

Code Security Best Practices: Protecting Your Projects When Collaborating and Using AI

Comments
11 min read
Build a Cybersecurity Link-Analyzer with Go

Build a Cybersecurity Link-Analyzer with Go

1
Comments 2
4 min read
Introducing agentless API discovery & inventory - Congrats to our tech team!

Introducing agentless API discovery & inventory - Congrats to our tech team!

5
Comments
1 min read
Writing secure code for web applications🔓

Writing secure code for web applications🔓

Comments
4 min read
#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

#3 The Hacker Mindset Playbook: Intuitively self-aware systems, with anatomical basis of origin

Comments
3 min read
🔐 Enhancing Security of React Apps

🔐 Enhancing Security of React Apps

Comments
1 min read
Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Custom Rules 101: Preventing sensitive information leakage in your Ansible Playbooks

Comments
4 min read
Exploit Development: Buffer Overflows

Exploit Development: Buffer Overflows

10
Comments
3 min read
Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

Open Source is More Secure than Closed Source because Closed Source is More Secure than Open Source

2
Comments 2
4 min read
Subnetting

Subnetting

15
Comments 3
3 min read
Web Application Security 101

Web Application Security 101

2
Comments
1 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape

Comments
8 min read
Can you become an Ethical Hacker without a degree?

Can you become an Ethical Hacker without a degree?

2
Comments
3 min read
Secure Connection between Lambda and RDS: Choosing and Implementing SSL/TLS Certificates

Secure Connection between Lambda and RDS: Choosing and Implementing SSL/TLS Certificates

7
Comments
2 min read
Como identificar vulnerabilidades no código fonte?

Como identificar vulnerabilidades no código fonte?

23
Comments 3
8 min read
Express.js Security Best Practices

Express.js Security Best Practices

2
Comments
3 min read
Navigating the JavaScript Frontier with is.primitive and is.not_primitive from 'thiis'

Navigating the JavaScript Frontier with is.primitive and is.not_primitive from 'thiis'

5
Comments 1
3 min read
Unraveling My Uncle's Online Gold Scam

Unraveling My Uncle's Online Gold Scam

8
Comments 2
8 min read
Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 5. Connecting dots

Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 5. Connecting dots

2
Comments 1
4 min read
Essential AWS IAM Enumeration Commands

Essential AWS IAM Enumeration Commands

2
Comments
6 min read
API World 2023: Bringing together API, AI, and Secrets security

API World 2023: Bringing together API, AI, and Secrets security

1
Comments
9 min read
Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

Implementing Secure Access Control using AWS WAF with IP Address and BASIC Authentication

Comments
4 min read
Explorando a api do kubernetes

Explorando a api do kubernetes

Comments
9 min read
SSL/TLS Handshake Explained: A Simple Guide for Secure Connections!

SSL/TLS Handshake Explained: A Simple Guide for Secure Connections!

6
Comments 1
9 min read
How to Search for Open Amazon S3 Buckets and Their Contents Using OpenBuckets

How to Search for Open Amazon S3 Buckets and Their Contents Using OpenBuckets

1
Comments
3 min read
Cross-Origin Resource Sharing (CORS)

Cross-Origin Resource Sharing (CORS)

28
Comments 7
7 min read
Navigating the Browser Landscape with is.ie and is.not_ie from 'thiis': A Journey into Internet Explorer Detection

Navigating the Browser Landscape with is.ie and is.not_ie from 'thiis': A Journey into Internet Explorer Detection

8
Comments 1
3 min read
AWS security audit guide

AWS security audit guide

2
Comments 1
3 min read
Use IAM Roles Anywhere to reduce the use of IAM keys

Use IAM Roles Anywhere to reduce the use of IAM keys

7
Comments
31 min read
The Secure Path Forward for eBPF runtime: Challenges and Innovations

The Secure Path Forward for eBPF runtime: Challenges and Innovations

4
Comments
16 min read
Hashing User Passwords Using bcrypt in Python

Hashing User Passwords Using bcrypt in Python

8
Comments
5 min read
Docker Scout for Your Kubernetes Cluster

Docker Scout for Your Kubernetes Cluster

1
Comments
6 min read
Authorization

Authorization

1
Comments 1
3 min read
OPA vs. Google Zanzibar: A Brief Comparison

OPA vs. Google Zanzibar: A Brief Comparison

12
Comments
5 min read
Security in modern Web Applications -> Owasp to the rescue!

Security in modern Web Applications -> Owasp to the rescue!

10
Comments 4
4 min read
Use SOPS in Ansible to read your secrets

Use SOPS in Ansible to read your secrets

Comments
12 min read
Unleashing the Power of `is.edge` and `is.not_edge` with 'thiis': Your Gateway to JavaScript Magic

Unleashing the Power of `is.edge` and `is.not_edge` with 'thiis': Your Gateway to JavaScript Magic

4
Comments 1
4 min read
Cyber Security Analyst vs. Cyber Security Consultant

Cyber Security Analyst vs. Cyber Security Consultant

2
Comments
4 min read
Navigating the Browser World with is.chrome and is.not_chrome: Your Friendly Guide to Browser Checks

Navigating the Browser World with is.chrome and is.not_chrome: Your Friendly Guide to Browser Checks

3
Comments 1
3 min read
Securing Connections: A Comprehensive Guide to IPSec and VPN Mastery

Securing Connections: A Comprehensive Guide to IPSec and VPN Mastery

1
Comments
9 min read
Building Secure Foundations: A Practical Guide to Minimizing Linux Services' Attack Surface

Building Secure Foundations: A Practical Guide to Minimizing Linux Services' Attack Surface

10
Comments
11 min read
Two simple rules for better and more secure code

Two simple rules for better and more secure code

23
Comments 4
3 min read
Secure your Web Applications with Facial Authentication

Secure your Web Applications with Facial Authentication

10
Comments 1
6 min read
Como começar a estudar Cybersecurity?

Como começar a estudar Cybersecurity?

80
Comments 16
8 min read
The Role of AI in Optimising API Performance

The Role of AI in Optimising API Performance

Comments
9 min read
Unleashing the Magic of `is.truthy` and `is.not_truthy` with 'thiis': A Playground of JavaScript Booleans

Unleashing the Magic of `is.truthy` and `is.not_truthy` with 'thiis': A Playground of JavaScript Booleans

4
Comments 1
3 min read
How To Secure Your AWS API Gateway Using A Lambda Authorizer

How To Secure Your AWS API Gateway Using A Lambda Authorizer

5
Comments
8 min read
Rails Authentication for Compliance

Rails Authentication for Compliance

1
Comments 3
4 min read
On the joy of learning and bypassing brute-force protection

On the joy of learning and bypassing brute-force protection

4
Comments
4 min read
loading...