DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 26 of my 90-Day Devops: Kubernetes Secrets and Access Control

Day 26 of my 90-Day Devops: Kubernetes Secrets and Access Control

6
Comments
4 min read
SSO and RBAC: A Secure Access Strategy for your Kubernetes

SSO and RBAC: A Secure Access Strategy for your Kubernetes

1
Comments
6 min read
Enhancing Your Azure Arc Enabled Server Security with Microsoft Defender for Cloud

Enhancing Your Azure Arc Enabled Server Security with Microsoft Defender for Cloud

5
Comments
2 min read
How to avoid one of the biggest risks in mobile security as an iOS developer

How to avoid one of the biggest risks in mobile security as an iOS developer

Comments
6 min read
Top 10 Cloud Security Startups to Watch in 2024

Top 10 Cloud Security Startups to Watch in 2024

8
Comments
6 min read
EnvLock: The Ultimate Env Manager

EnvLock: The Ultimate Env Manager

7
Comments 2
4 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Code Smell 261 - DigiCert Underscores

Code Smell 261 - DigiCert Underscores

3
Comments
2 min read
Supercharging API Security: APISIX with OpenFGA

Supercharging API Security: APISIX with OpenFGA

1
Comments
5 min read
Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

1
Comments
3 min read
AWS Lambda with CloudFront configuration guide

AWS Lambda with CloudFront configuration guide

Comments
9 min read
Understanding the Basics of Network Security: A Guide for Beginners🔍

Understanding the Basics of Network Security: A Guide for Beginners🔍

1
Comments
2 min read
The sad story of node update!

The sad story of node update!

1
Comments 1
3 min read
Implementing JWT Authentication with Express, MongoDB, and Passport.js

Implementing JWT Authentication with Express, MongoDB, and Passport.js

3
Comments
14 min read
Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

5
Comments
4 min read
🔐🛡️ Var, Let, Const: How Declaration Choices Affect Your Code's Security

🔐🛡️ Var, Let, Const: How Declaration Choices Affect Your Code's Security

Comments
3 min read
Simple way to store secrets in Android Project.

Simple way to store secrets in Android Project.

3
Comments
2 min read
Implementing a Dynamic RBAC System for Enterprise Applications - Simplified

Implementing a Dynamic RBAC System for Enterprise Applications - Simplified

1
Comments
4 min read
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

2
Comments
8 min read
Securing Kubernetes Production: Avoid These 11 Common Misconfigurations

Securing Kubernetes Production: Avoid These 11 Common Misconfigurations

1
Comments
8 min read
Extensive threat detection and monitoring features of AWS Security Services

Extensive threat detection and monitoring features of AWS Security Services

1
Comments
8 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
Uncomplicated Firewall (UFW)

Uncomplicated Firewall (UFW)

2
Comments 1
5 min read
An Opinionated Ramp Up Guide to AWS Pentesting

An Opinionated Ramp Up Guide to AWS Pentesting

1
Comments
15 min read
3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

Comments
1 min read
Server Certificate Chain

Server Certificate Chain

Comments
3 min read
Effective Strategies for MySQL User Management

Effective Strategies for MySQL User Management

Comments
1 min read
Make your App 10x Secure with Arcjet Protection Layer

Make your App 10x Secure with Arcjet Protection Layer

41
Comments 7
22 min read
Intersection of AI and Data Privacy

Intersection of AI and Data Privacy

2
Comments
4 min read
[picoctf]Binary Search writeup

[picoctf]Binary Search writeup

4
Comments
1 min read
[picoctf] Scan Surprise writeup

[picoctf] Scan Surprise writeup

Comments
1 min read
Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

8
Comments
3 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
Security news weekly round-up - 9th August 2024

Security news weekly round-up - 9th August 2024

Comments
5 min read
Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

57
Comments
6 min read
An introduction to Postgres Row Level Security (RLS)

An introduction to Postgres Row Level Security (RLS)

6
Comments
2 min read
Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

2
Comments
4 min read
Commentary on CrowdStrike BSOD Root Cause Analysis Release

Commentary on CrowdStrike BSOD Root Cause Analysis Release

Comments
1 min read
Common Issues and Resolutions When Setting Up a VPC in AWS

Common Issues and Resolutions When Setting Up a VPC in AWS

Comments
3 min read
High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

5
Comments
5 min read
Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

1
Comments
2 min read
Issue 57 & 58 of AWS Cloud Security Weekly

Issue 57 & 58 of AWS Cloud Security Weekly

1
Comments 1
2 min read
Simple and Easy-to-Use Web Security Gateway

Simple and Easy-to-Use Web Security Gateway

5
Comments
2 min read
Building an Authentication System with MERN

Building an Authentication System with MERN

1
Comments
4 min read
How we use Kubernetes jobs to scale OpenSSF Scorecard

How we use Kubernetes jobs to scale OpenSSF Scorecard

10
Comments
7 min read
Understanding Linux Permissions

Understanding Linux Permissions

17
Comments
2 min read
Securing the Cloud #32

Securing the Cloud #32

Comments
5 min read
HTB Academy: Attacking Common Services - Hard Lab

HTB Academy: Attacking Common Services - Hard Lab

2
Comments
4 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Cryptography #0 - Essential Concepts

Cryptography #0 - Essential Concepts

4
Comments
7 min read
Introducing OpenSSF Scorecard for OpenSauced

Introducing OpenSSF Scorecard for OpenSauced

15
Comments 1
5 min read
HTB Academy: Attacking Common Services - Medium Lab

HTB Academy: Attacking Common Services - Medium Lab

2
Comments
3 min read
Secure Data and Safeguard Users an App With End-to-End Encryption

Secure Data and Safeguard Users an App With End-to-End Encryption

Comments
9 min read
HTB Academy: Attacking Common Services Module - Easy Lab

HTB Academy: Attacking Common Services Module - Easy Lab

2
Comments
2 min read
Is magic link sign-in dying? A closer look at its declining popularity

Is magic link sign-in dying? A closer look at its declining popularity

22
Comments 2
3 min read
Day 8: Mastering Bash Scripting in DevOps

Day 8: Mastering Bash Scripting in DevOps

3
Comments
2 min read
Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

2
Comments 1
9 min read
Protect Sensitive Pages With Nginx

Protect Sensitive Pages With Nginx

2
Comments
2 min read
loading...