DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Implementing Security for Your Business

Implementing Security for Your Business

7
Comments
3 min read
Security, meet Agile; Reviewing code you dislike; and Web Performance KPIs

Security, meet Agile; Reviewing code you dislike; and Web Performance KPIs

15
Comments
2 min read
Securing IIS

Securing IIS

8
Comments
2 min read
Upgrading APIs, Cloud security & some Engineering advice

Upgrading APIs, Cloud security & some Engineering advice

8
Comments
2 min read
Python Encryption with Trezor

Python Encryption with Trezor

5
Comments
3 min read
Trezor hardware wallet with Python

Trezor hardware wallet with Python

8
Comments
2 min read
How users and applications stay safe on the Internet: it's proxy servers all the way down

How users and applications stay safe on the Internet: it's proxy servers all the way down

91
Comments 1
9 min read
How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

How to Create a Bitcoin Savings Wallet Using Qvault and Sentinel

6
Comments
4 min read
Why are you not using HTTPS?

Why are you not using HTTPS?

11
Comments
1 min read
Bots are Playing a Bigger Role in the Election than People Realize

Bots are Playing a Bigger Role in the Election than People Realize

6
Comments
23 min read
Compromising User Data via Push Notification Services

Compromising User Data via Push Notification Services

6
Comments
3 min read
Hack Rails with vulnerabilities by OWASP

Hack Rails with vulnerabilities by OWASP

5
Comments
1 min read
“Why would anyone hack me? I’m just a small business owner!”

“Why would anyone hack me? I’m just a small business owner!”

7
Comments
1 min read
My story of setting up Let’s Encrypt SSL on SiteGround

My story of setting up Let’s Encrypt SSL on SiteGround

6
Comments 1
1 min read
Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

Is it still safe for large production applications with a large user base to use bcrypt as the password hashing algorithm ?

8
Comments 3
1 min read
You have critical security vulnerabilities in your software but you don’t know it yet!

You have critical security vulnerabilities in your software but you don’t know it yet!

5
Comments
13 min read
Presentations I would love to watch

Presentations I would love to watch

6
Comments
2 min read
Weekly Links #3

Weekly Links #3

8
Comments
3 min read
How to Securely Backup a Seed Phrase

How to Securely Backup a Seed Phrase

5
Comments
3 min read
Why you should use uBlock Origin just like me?

Why you should use uBlock Origin just like me?

4
Comments
1 min read
The target="_blank" vulnerability by example

The target="_blank" vulnerability by example

39
Comments 15
3 min read
Robots Protect Better Than You

Robots Protect Better Than You

7
Comments
3 min read
Problems that forced me to leave Dashlane for 1Password

Problems that forced me to leave Dashlane for 1Password

2
Comments
1 min read
How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

How mlytics patched Cloudflare WAF bypass vulnerability (on our end)

3
Comments
6 min read
How to Build your own Amazon Ring Security System in an Afternoon

How to Build your own Amazon Ring Security System in an Afternoon

63
Comments
16 min read
Using Microsoft Defender ATP Streaming API with Misp

Using Microsoft Defender ATP Streaming API with Misp

5
Comments
6 min read
5 steps to make your iOS app more secure

5 steps to make your iOS app more secure

7
Comments
3 min read
Security Basics Every Programmer should know from the Start

Security Basics Every Programmer should know from the Start

6
Comments
3 min read
What is a password manager?

What is a password manager?

3
Comments
1 min read
Block SSH brute-force attacks

Block SSH brute-force attacks

13
Comments 7
2 min read
A maze called VPN logging policies

A maze called VPN logging policies

6
Comments 3
2 min read
Importance of GDPR Compliance in a Development Project?

Importance of GDPR Compliance in a Development Project?

3
Comments
4 min read
Protecting your digital self at Hacker Summer Camp

Protecting your digital self at Hacker Summer Camp

6
Comments
1 min read
My password policy

My password policy

4
Comments
2 min read
Blockchain Solution - Alwin Technologies

Blockchain Solution - Alwin Technologies

3
Comments 1
1 min read
TELLIT

TELLIT

9
Comments
1 min read
You can’t function in 2019 without a password manager

You can’t function in 2019 without a password manager

6
Comments
3 min read
You stole my source code on Neopets

You stole my source code on Neopets

5
Comments
7 min read
Why Should You Use Cloudflare Like I Do

Why Should You Use Cloudflare Like I Do

4
Comments
1 min read
What if your laptop or hard drive with sensitive data is stolen or you lost it?

What if your laptop or hard drive with sensitive data is stolen or you lost it?

11
Comments
6 min read
The Dangers of Shadow IT

The Dangers of Shadow IT

4
Comments
3 min read
How to use python objects like java-script dictionaries.

How to use python objects like java-script dictionaries.

6
Comments
1 min read
Introducing Osgood

Introducing Osgood

43
Comments 5
4 min read
How to Protect a WordPress site from being Hacked

How to Protect a WordPress site from being Hacked

5
Comments
17 min read
Pipdig Under Investigation (and Your Options If You Want Out)

Pipdig Under Investigation (and Your Options If You Want Out)

5
Comments
8 min read
WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

WordPress Infected with the Pharma Hack? How to Detect, Clean and Secure your site from it

5
Comments
13 min read
0-day Vulnerability for Social Warfare WordPress plugin

0-day Vulnerability for Social Warfare WordPress plugin

4
Comments
2 min read
WooCommerce Checkout Manager 4.2.6 Vulnerability

WooCommerce Checkout Manager 4.2.6 Vulnerability

3
Comments
1 min read
Secrets Management in Elixir Using AWS

Secrets Management in Elixir Using AWS

19
Comments
3 min read
SAST Tooling – Part 2: The selection criteria

SAST Tooling – Part 2: The selection criteria

5
Comments
3 min read
Securing APIs and Microservices with OAuth and OpenID Connect

Securing APIs and Microservices with OAuth and OpenID Connect

9
Comments
1 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

14
Comments
6 min read
Chatbot Security Framework: Everything you need to know about Chatbot security

Chatbot Security Framework: Everything you need to know about Chatbot security

4
Comments
7 min read
Technology landscape for Identification Management System

Technology landscape for Identification Management System

9
Comments
4 min read
Using EasyAuth (AppService Authentication) with ASP.NET Core

Using EasyAuth (AppService Authentication) with ASP.NET Core

12
Comments
3 min read
The latest npm breach…or is it?

The latest npm breach…or is it?

4
Comments
8 min read
How to protect your Node.js applications from malicious dependencies

How to protect your Node.js applications from malicious dependencies

6
Comments
5 min read
AppArmor with Python

AppArmor with Python

3
Comments
2 min read
Eight moderator factors of security and performance verification

Eight moderator factors of security and performance verification

8
Comments 1
1 min read
SAST Tooling – Part 3: The Winner

SAST Tooling – Part 3: The Winner

5
Comments
4 min read
loading...