DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
ZOOMing in on CISO, Jason Lee

ZOOMing in on CISO, Jason Lee

6
Comments 1
3 min read
Encryption as a Service in Action

Encryption as a Service in Action

9
Comments
5 min read
Abusing the Type System

Abusing the Type System

4
Comments
6 min read
10 Best Practices for Application Security in the Cloud

10 Best Practices for Application Security in the Cloud

7
Comments 1
7 min read
5 server security tips for beginners

5 server security tips for beginners

5
Comments
6 min read
Security best practices on AWS

Security best practices on AWS

23
Comments 2
3 min read
Aerospike Security Events and Audit Logs

Aerospike Security Events and Audit Logs

5
Comments
3 min read
Aerospike Authentication and Authorization

Aerospike Authentication and Authorization

5
Comments
5 min read
Aerospike Data Protection

Aerospike Data Protection

4
Comments
5 min read
Aerospike Network Security

Aerospike Network Security

4
Comments
7 min read
Another Reason to Avoid Constantize in Rails

Another Reason to Avoid Constantize in Rails

7
Comments
5 min read
Cryptography Introduction: Block Ciphers

Cryptography Introduction: Block Ciphers

15
Comments
12 min read
In Which Sarah Learns Web Security: Part Two, Input and Output

In Which Sarah Learns Web Security: Part Two, Input and Output

5
Comments
6 min read
Cracking Spotify Codes and making a quest out of it

Cracking Spotify Codes and making a quest out of it

10
Comments 1
5 min read
Automating deploying Vault, a password manager for your code, with Terraform

Automating deploying Vault, a password manager for your code, with Terraform

10
Comments
9 min read
Running a Graphical Application from a Docker Container - Simply and Securely

Running a Graphical Application from a Docker Container - Simply and Securely

8
Comments
16 min read
Why Firestore Encourages Bad Security

Why Firestore Encourages Bad Security

39
Comments 16
7 min read
Using your Yubikey for Signed Git Commits

Using your Yubikey for Signed Git Commits

18
Comments 4
3 min read
Set up your own VPN with OpenVPN and DigitalOcean

Set up your own VPN with OpenVPN and DigitalOcean

8
Comments 1
3 min read
Use mitmproxy as a personal firewall

Use mitmproxy as a personal firewall

8
Comments 2
3 min read
What is a DDoS attack anyway?

What is a DDoS attack anyway?

10
Comments
5 min read
NodeSecure v0.7.0 and v0.8.0@next

NodeSecure v0.7.0 and v0.8.0@next

6
Comments
3 min read
Using your Yubikey to store your SSH Key (RSA 4096)

Using your Yubikey to store your SSH Key (RSA 4096)

27
Comments 1
4 min read
Security news weekly round-up - 11th September 2020

Security news weekly round-up - 11th September 2020

3
Comments
3 min read
Serving private content from S3 using CloudFront

Serving private content from S3 using CloudFront

3
Comments
7 min read
Schneier on Cryptography. 🎤Live Interview

Schneier on Cryptography. 🎤Live Interview

12
Comments
7 min read
Offline Digital Identity without Internet and Digital ID for Refugees

Offline Digital Identity without Internet and Digital ID for Refugees

6
Comments
4 min read
How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

How to End-to-End Encrypt in Messages Using Twilio and Virgil Security

4
Comments
7 min read
How to Securely Access The Dark Web in 15 Steps. First Part

How to Securely Access The Dark Web in 15 Steps. First Part

7
Comments
8 min read
Everybody hates CSRF

Everybody hates CSRF

37
Comments 3
4 min read
What is TLS? Transport Layer Security encryption explained in plain english

What is TLS? Transport Layer Security encryption explained in plain english

82
Comments 3
5 min read
You've been on a Public Network ? That's bad Security Practice

You've been on a Public Network ? That's bad Security Practice

2
Comments
4 min read
Top 15 Tools for Automating Security in DevOps

Top 15 Tools for Automating Security in DevOps

35
Comments
4 min read
Guide to Cyber Security: learn how to defend your systems

Guide to Cyber Security: learn how to defend your systems

17
Comments
10 min read
Hacking is not black and white!

Hacking is not black and white!

8
Comments
5 min read
The Simplest Way to Authorize Github OAuth Apps with Next.js and Cotter

The Simplest Way to Authorize Github OAuth Apps with Next.js and Cotter

9
Comments
15 min read
Common Biometric Authentication Security Mistakes

Common Biometric Authentication Security Mistakes

5
Comments 1
3 min read
In Which Sarah Learns Web Security: Part One, Introduction and General Principles

In Which Sarah Learns Web Security: Part One, Introduction and General Principles

7
Comments
7 min read
Crack with VSCode Hex Editor

Crack with VSCode Hex Editor

11
Comments
3 min read
Using your Yubikey to get started with GPG

Using your Yubikey to get started with GPG

31
Comments
6 min read
Making Sense of the Zero Trust Cybersecurity Product Space

Making Sense of the Zero Trust Cybersecurity Product Space

5
Comments
4 min read
What does it take to create a strong password?

What does it take to create a strong password?

43
Comments 26
1 min read
How to install OpenVPN on CentOS 7

How to install OpenVPN on CentOS 7

4
Comments
4 min read
Using Kitchen-Terraform with the GCP CIS Benchmark Profile

Using Kitchen-Terraform with the GCP CIS Benchmark Profile

3
Comments 2
4 min read
What is the web scraping and how it works?

What is the web scraping and how it works?

54
Comments 7
2 min read
Storing tokens in single-page applications

Storing tokens in single-page applications

275
Comments 11
2 min read
How to add free SSL to any Website

How to add free SSL to any Website

32
Comments 1
1 min read
Terraform Development & Testing Introduction

Terraform Development & Testing Introduction

10
Comments
4 min read
LGPD - Parte II - Termos e Definições

LGPD - Parte II - Termos e Definições

3
Comments
3 min read
Security Best Practices for Node.js

Security Best Practices for Node.js

17
Comments
10 min read
Top 6 Web Security Take-Aways From Google CTF 2020

Top 6 Web Security Take-Aways From Google CTF 2020

12
Comments 2
8 min read
Spot False Positives in Static Scans: Password Management

Spot False Positives in Static Scans: Password Management

4
Comments
4 min read
Separating Sensitive Data from Code (using python-decouple)

Separating Sensitive Data from Code (using python-decouple)

9
Comments
2 min read
How To Secure Your Software Development Life Cycle (SDLC)

How To Secure Your Software Development Life Cycle (SDLC)

8
Comments
5 min read
CVE Scanner GitHub Action

CVE Scanner GitHub Action

7
Comments
3 min read
Should I share more posts on TLS 1.2???

Should I share more posts on TLS 1.2???

2
Comments 2
1 min read
Why Password Length Matters

Why Password Length Matters

13
Comments 2
5 min read
Named Data Networking (NDN) — The new internet.

Named Data Networking (NDN) — The new internet.

14
Comments
4 min read
package.json vs package-lock.json: do you need both?

package.json vs package-lock.json: do you need both?

45
Comments 4
3 min read
API Implementation Recommendations

API Implementation Recommendations

5
Comments
3 min read
loading...