DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
10 Rules for Protecting your Computer from Malware

10 Rules for Protecting your Computer from Malware

4
Comments
4 min read
Defense Against the Dark Arts: CSRF Attacks

Defense Against the Dark Arts: CSRF Attacks

60
Comments 14
1 min read
Securing Single-page Applications with OpenID Connect

Securing Single-page Applications with OpenID Connect

4
Comments
1 min read
I Clicked On A Facebook Scam To See What Would Happen

I Clicked On A Facebook Scam To See What Would Happen

47
Comments 27
6 min read
Data security in multi-tenant SaaS applications

Data security in multi-tenant SaaS applications

22
Comments
4 min read
Already Hacked - Security Environment of the System 01:21

Already Hacked - Security Environment of the System

3
Comments
1 min read
HoneyDocker

HoneyDocker

5
Comments
10 min read
Implementing Type Classes for Verifying Cryptography

Implementing Type Classes for Verifying Cryptography

1
Comments
2 min read
GitHub security: what does it take to protect your company from credentials leaking on GitHub?

GitHub security: what does it take to protect your company from credentials leaking on GitHub?

3
Comments
7 min read
Secure Quiz platform

Secure Quiz platform

2
Comments
1 min read
Writing software for a malicious world

Writing software for a malicious world

12
Comments
3 min read
Secure way of doing OAuth for SPA & Native Apps

Secure way of doing OAuth for SPA & Native Apps

23
Comments
3 min read
How to handle PII in websites and web apps

How to handle PII in websites and web apps

6
Comments
7 min read
How to use open source kube-scan to find Kubernetes security risks

How to use open source kube-scan to find Kubernetes security risks

6
Comments
3 min read
Vulnerability Management: 5 Best Practices to Protect Your Business

Vulnerability Management: 5 Best Practices to Protect Your Business

7
Comments
9 min read
Differences Between Static Code Analysis and Dynamic Testing

Differences Between Static Code Analysis and Dynamic Testing

6
Comments
5 min read
What is SQL injection and how do I avoid it in Go?

What is SQL injection and how do I avoid it in Go?

15
Comments 7
5 min read
API Security for the Data Layer

API Security for the Data Layer

3
Comments
3 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

9
Comments
3 min read
Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

Best practice setup for Infrastructure as Code with Terraform, Kubernetes and Helm (part 1)

5
Comments
3 min read
Microsoft is absolutely at fault for WannaCry

Microsoft is absolutely at fault for WannaCry

13
Comments 32
4 min read
Securing GraphQL API from malicious queries

Securing GraphQL API from malicious queries

16
Comments
6 min read
The Impact of Security Misconfiguration and Its Mitigation

The Impact of Security Misconfiguration and Its Mitigation

2
Comments
4 min read
5 DevOps Monitoring Strategies for Your Application

5 DevOps Monitoring Strategies for Your Application

39
Comments
7 min read
DockerCon 2017 recap

DockerCon 2017 recap

16
Comments
3 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

2
Comments
1 min read
Recipe for Infection: Ransomware

Recipe for Infection: Ransomware

12
Comments
3 min read
Predictive vs. Adaptive SDLC: What is the Difference?

Predictive vs. Adaptive SDLC: What is the Difference?

2
Comments
5 min read
A Strategy for Passing AWS Certifications

A Strategy for Passing AWS Certifications

6
Comments 1
4 min read
Evil Session Tokens

Evil Session Tokens

13
Comments 12
2 min read
How my car insurance exposed my position

How my car insurance exposed my position

4
Comments 4
7 min read
Are Your Children Safe?

Are Your Children Safe?

14
Comments
1 min read
My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

My All-Time Favorite Demonstration of a Cross-Site Scripting Attack

57
Comments 14
3 min read
Clarifying Authentication and Authorization with Lupe Fiasco

Clarifying Authentication and Authorization with Lupe Fiasco

3
Comments 1
2 min read
Single Sign-On SSH: User Story

Single Sign-On SSH: User Story

3
Comments
2 min read
How Companies Prey On Your Ignorance of Tech and Your Fear of Hackers

How Companies Prey On Your Ignorance of Tech and Your Fear of Hackers

25
Comments 10
3 min read
The Normal Person's Guide to Internet Security

The Normal Person's Guide to Internet Security

11
Comments 4
6 min read
Don't Click That Google Docs Link: An Overview of The Google Docs Phish Going Around Today

Don't Click That Google Docs Link: An Overview of The Google Docs Phish Going Around Today

7
Comments
3 min read
Authentication Best Practices in REST and GraphQL APIs

Authentication Best Practices in REST and GraphQL APIs

7
Comments
8 min read
Seven Easy Ways to Protect Your WordPress Site

Seven Easy Ways to Protect Your WordPress Site

2
Comments
4 min read
Fully Remove Zoom from your Mac

Fully Remove Zoom from your Mac

6
Comments
3 min read
Jupyter notebook to check software for CVE vulnerabilities

Jupyter notebook to check software for CVE vulnerabilities

3
Comments
1 min read
From Cloud Security Alert to Open Source Bugfix

From Cloud Security Alert to Open Source Bugfix

9
Comments
4 min read
Capture the Flag: It's a game for hack...I mean security professionals

Capture the Flag: It's a game for hack...I mean security professionals

57
Comments 9
10 min read
Hackers Exploit Two-factor Authentication to Steal Millions and How to Fix It

Hackers Exploit Two-factor Authentication to Steal Millions and How to Fix It

3
Comments
5 min read
Istio Service Mesh in 2020: Envoy In, Control Plane Simplified

Istio Service Mesh in 2020: Envoy In, Control Plane Simplified

6
Comments
4 min read
Know Your Privacy Rights: What Devices And Web Apps Are Hiding From You

Know Your Privacy Rights: What Devices And Web Apps Are Hiding From You

2
Comments
9 min read
Lessons learned while working on large-scale server software

Lessons learned while working on large-scale server software

26
Comments
2 min read
Enviorment variables to keep your app safe

Enviorment variables to keep your app safe

5
Comments
2 min read
Unfolding & Sugar Coating for Kubernetes RBAC

Unfolding & Sugar Coating for Kubernetes RBAC

6
Comments
2 min read
Interferencias, privacy activism

Interferencias, privacy activism

2
Comments 3
1 min read
Sorry, I hacked you.

Sorry, I hacked you.

12
Comments 7
3 min read
How to scan your AWS account for old access keys using python

How to scan your AWS account for old access keys using python

5
Comments
3 min read
What's the best way to connect to an machine behind CGNAT.

What's the best way to connect to an machine behind CGNAT.

7
Comments
1 min read
Analizando un método de bypass de sistemas WAF

Analizando un método de bypass de sistemas WAF

5
Comments
2 min read
The Root Cause of Input-Based Security Vulnerabilities – Don’t Fear the Grammar

The Root Cause of Input-Based Security Vulnerabilities – Don’t Fear the Grammar

8
Comments
3 min read
NKN SDK: powering client side communication without servers

NKN SDK: powering client side communication without servers

6
Comments
3 min read
7 Web Application Security Best Practices You Need to Know

7 Web Application Security Best Practices You Need to Know

7
Comments
1 min read
How to Verify Your Mastodon Account with Keybase

How to Verify Your Mastodon Account with Keybase

9
Comments
3 min read
Self-hosted team password manager using KeeWeb

Self-hosted team password manager using KeeWeb

10
Comments
5 min read
loading...