DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Fast Track to AWS Security - Feb 26 2019 34:20

The Fast Track to AWS Security - Feb 26 2019

20
Comments
1 min read
How to Find Subdomains on a Website (And Why You Should)

How to Find Subdomains on a Website (And Why You Should)

211
Comments 11
4 min read
Protecting Your API Keys - Rails

Protecting Your API Keys - Rails

11
Comments 1
2 min read
Learning Python Networking

Learning Python Networking

11
Comments
1 min read
Do your tech demos share too much?

Do your tech demos share too much?

5
Comments 1
4 min read
ClamAV: Fixing freshclam's Hanging Up

ClamAV: Fixing freshclam's Hanging Up

5
Comments 1
2 min read
How does Tor really work?

How does Tor really work?

161
Comments 4
17 min read
Mastering Python for Networking and Security

Mastering Python for Networking and Security

10
Comments
2 min read
Solving a CTF challenge

Solving a CTF challenge

20
Comments 1
3 min read
How to Hire a Cybersecurity Expert (Before It’s Too Late)

How to Hire a Cybersecurity Expert (Before It’s Too Late)

5
Comments 2
4 min read
Top 3 Development Trends in 2019

Top 3 Development Trends in 2019

61
Comments 2
3 min read
Facebook stored hundreds of millions of passwords in plaintext

Facebook stored hundreds of millions of passwords in plaintext

66
Comments 29
1 min read
Levelling-up your SSH Private Key from RSA to ED25519 + Symmetric Password Protection

Levelling-up your SSH Private Key from RSA to ED25519 + Symmetric Password Protection

12
Comments
2 min read
This is why I use KeyCloak?

This is why I use KeyCloak?

4
Comments
2 min read
CIA: Confidentiality, Integrity and Availability

CIA: Confidentiality, Integrity and Availability

15
Comments 2
4 min read
Beefing Up Your Spring Security with Two-Factor Authentication

Beefing Up Your Spring Security with Two-Factor Authentication

14
Comments 1
10 min read
Securing environment variables with lastpass

Securing environment variables with lastpass

17
Comments 3
2 min read
Share a NAT-GW through TGW

Share a NAT-GW through TGW

1
Comments
3 min read
Firestore Database Structure and Security:

Firestore Database Structure and Security:

16
Comments
6 min read
Azure Key Vault

Azure Key Vault

6
Comments
3 min read
Secure Your Mobile App - Episode Four (Secure User Auth)

Secure Your Mobile App - Episode Four (Secure User Auth)

6
Comments
5 min read
Monit: email alerting on an SSH logins

Monit: email alerting on an SSH logins

17
Comments
3 min read
Secure Your Mobile App - Episode Three (Securing Data in Transit)

Secure Your Mobile App - Episode Three (Securing Data in Transit)

5
Comments
4 min read
Top 10 Tips to Secure SSH Your Server

Top 10 Tips to Secure SSH Your Server

76
Comments 4
4 min read
Break the Ice — Hardware CTF

Break the Ice — Hardware CTF

13
Comments
7 min read
Privacy by design (Pragmatic Privacy for Programmers, Part 3)

Privacy by design (Pragmatic Privacy for Programmers, Part 3)

10
Comments 2
6 min read
Secure Your Mobile App - Episode Two (Securing Data at Rest)

Secure Your Mobile App - Episode Two (Securing Data at Rest)

8
Comments
5 min read
Logging Activity With Laravel and Pusher

Logging Activity With Laravel and Pusher

11
Comments
3 min read
Secure Your Mobile App - Episode One (Protecting the Code)

Secure Your Mobile App - Episode One (Protecting the Code)

4
Comments
9 min read
Mobile Health Care Apps and HIPAA Compliance

Mobile Health Care Apps and HIPAA Compliance

20
Comments 6
5 min read
Securing Logic App Http triggers

Securing Logic App Http triggers

6
Comments
5 min read
A Quick Guide to OAuth 2.0 with Spring Security

A Quick Guide to OAuth 2.0 with Spring Security

20
Comments
12 min read
Security For Your Web Apps - And Why It's Important

Security For Your Web Apps - And Why It's Important

82
Comments 2
5 min read
This Why You Should Start doing Code Reviews

This Why You Should Start doing Code Reviews

11
Comments 1
2 min read
Docker images and playing cards: a security illustration

Docker images and playing cards: a security illustration

11
Comments
2 min read
Authentication, Authorization, and OAuth

Authentication, Authorization, and OAuth

14
Comments
4 min read
Root Me: ELF-CrackPass with NSA's Ghidra

Root Me: ELF-CrackPass with NSA's Ghidra

12
Comments 6
7 min read
Nevertheless, Paula Coded

Nevertheless, Paula Coded

47
Comments 3
2 min read
The anatomy of a critical vulnerability

The anatomy of a critical vulnerability

13
Comments
4 min read
Phishing my company. An infosec lesson for businesses

Phishing my company. An infosec lesson for businesses

7
Comments 1
5 min read
How to avoid leaking secrets to the npm registry

How to avoid leaking secrets to the npm registry

42
Comments
2 min read
Public Key Cryptography Simply Explained

Public Key Cryptography Simply Explained

64
Comments 1
17 min read
Time to upgrade RubyGems

Time to upgrade RubyGems

8
Comments 1
1 min read
Vulnerability Identified in Docker & RunC

Vulnerability Identified in Docker & RunC

11
Comments 9
1 min read
How do you measure security? Security Metrics

How do you measure security? Security Metrics

14
Comments 5
1 min read
10 Awesome Security Tips for Python Enthusiasts

10 Awesome Security Tips for Python Enthusiasts

59
Comments
4 min read
How safe are your cat pics?

How safe are your cat pics?

20
Comments 1
4 min read
Are login forms that ask for your username and password on two different pages more secure?

Are login forms that ask for your username and password on two different pages more secure?

10
Comments 15
1 min read
OpenVPN: SSL and hostname configuration

OpenVPN: SSL and hostname configuration

5
Comments
3 min read
Firebase Functions: React users need to stop storing sensitive API keys in .env files!

Firebase Functions: React users need to stop storing sensitive API keys in .env files!

49
Comments 9
5 min read
Ten Ways to Secure your Applications

Ten Ways to Secure your Applications

63
Comments 2
9 min read
Dev Chats: Security Careers and Leadership with Alex Graul

Dev Chats: Security Careers and Leadership with Alex Graul

6
Comments
5 min read
Add Social Login to Secure Your JHipster App

Add Social Login to Secure Your JHipster App

6
Comments
11 min read
Protecting sensitive data using Secret Manager in .Net Core

Protecting sensitive data using Secret Manager in .Net Core

17
Comments 1
1 min read
Serverless Days Hamburg 2019 - Day 2

Serverless Days Hamburg 2019 - Day 2

10
Comments
7 min read
Automated SSL on our Internal Applications

Automated SSL on our Internal Applications

11
Comments
4 min read
Serverless Days Hamburg 2019 - Day 1

Serverless Days Hamburg 2019 - Day 1

11
Comments
4 min read
Practical Binary Analysis Book Review

Practical Binary Analysis Book Review

4
Comments
1 min read
Keygenme or Not

Keygenme or Not

8
Comments
3 min read
Clickjacking on Google CSE. Is this Important?

Clickjacking on Google CSE. Is this Important?

6
Comments 3
2 min read
loading...