DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Process Passwords as a Software Developer

How to Process Passwords as a Software Developer

686
Comments 41
4 min read
Low code, ultimate security - Secure Azure with Managed Identities

Low code, ultimate security - Secure Azure with Managed Identities

15
Comments
7 min read
Modern Trends Of Cyber Attacks

Modern Trends Of Cyber Attacks

9
Comments
1 min read
Resources for Talk: Prioritizing Trust while Creating Applications

Resources for Talk: Prioritizing Trust while Creating Applications

6
Comments
4 min read
Two Ways To Implement Secure Storage In Your Xamarin.Forms Mobile App

Two Ways To Implement Secure Storage In Your Xamarin.Forms Mobile App

7
Comments
6 min read
Use Client Certificate Authentication with Java and RestTemplate

Use Client Certificate Authentication with Java and RestTemplate

5
Comments 2
2 min read
Convert PFX certificate to JKS, P12, CRT

Convert PFX certificate to JKS, P12, CRT

7
Comments 2
2 min read
Git Authentication Errors

Git Authentication Errors

6
Comments
3 min read
Things I want to remember about SSH

Things I want to remember about SSH

371
Comments 16
5 min read
What Dev Teams Should Know about DevSecOps

What Dev Teams Should Know about DevSecOps

11
Comments
3 min read
Securing your docker images with Github actions for FREE!

Securing your docker images with Github actions for FREE!

52
Comments
2 min read
How to Extract an API Key from a Mobile App by Static Binary Analysis

How to Extract an API Key from a Mobile App by Static Binary Analysis

13
Comments 2
8 min read
What fields your User entity needs

What fields your User entity needs

10
Comments
3 min read
📖 Case Study: ⚙️ Reverse Engineering using Node JS 👾

📖 Case Study: ⚙️ Reverse Engineering using Node JS 👾

52
Comments 6
3 min read
How to Protect Your WordPress Site from Getting Hacked

How to Protect Your WordPress Site from Getting Hacked

14
Comments 1
11 min read
3 minutes 21 seconds vs 10000 years - Google's Quantum Supremacy Claim 🔥 💥👇

3 minutes 21 seconds vs 10000 years - Google's Quantum Supremacy Claim 🔥 💥👇

34
Comments 12
1 min read
Security in times of Docker & K8s; tech debt; & embedded integration frameworks

Security in times of Docker & K8s; tech debt; & embedded integration frameworks

42
Comments 4
3 min read
How to make APIs fast & secure, plus tips for REST APIs

How to make APIs fast & secure, plus tips for REST APIs

62
Comments
2 min read
What happens to our data when we die?

What happens to our data when we die?

32
Comments 1
3 min read
Introducing Certera

Introducing Certera

8
Comments
4 min read
Checking for vulnerabilities on your Java projects

Checking for vulnerabilities on your Java projects

7
Comments
2 min read
Phoenix and Elixir integration guide for passwordless authentication with Kno

Phoenix and Elixir integration guide for passwordless authentication with Kno

8
Comments
8 min read
Note Taking App - Make your notes saved securely

Note Taking App - Make your notes saved securely

4
Comments
2 min read
Secure Your SPA with Authorization Code Flow with PKCE

Secure Your SPA with Authorization Code Flow with PKCE

8
Comments
5 min read
New PHP vulnerability - CVE-2019-11043

New PHP vulnerability - CVE-2019-11043

4
Comments
1 min read
PicoCTF 2019: Cereal Hacker 2 (500p)

PicoCTF 2019: Cereal Hacker 2 (500p)

9
Comments
4 min read
Timing Attacks and the Timing-Allow-Origin Header

Timing Attacks and the Timing-Allow-Origin Header

6
Comments
2 min read
Hackers are using a bug in PHP7 to remotely hijack web servers

Hackers are using a bug in PHP7 to remotely hijack web servers

13
Comments
2 min read
Do you ever read "Terms and Conditions" and/or "Privacy Policies"?

Do you ever read "Terms and Conditions" and/or "Privacy Policies"?

6
Comments 12
1 min read
Root-Me: GB - Basic GameBoy crackme walkthrough

Root-Me: GB - Basic GameBoy crackme walkthrough

7
Comments
2 min read
Is Blockchain Wallet Safe

Is Blockchain Wallet Safe

3
Comments 2
1 min read
Weekly Links #10 #11

Weekly Links #10 #11

4
Comments
2 min read
How I Fixed JWT Security Flaws in 3 Steps

How I Fixed JWT Security Flaws in 3 Steps

279
Comments 43
4 min read
Hacktoberfest and privacy concerns

Hacktoberfest and privacy concerns

8
Comments 3
2 min read
Environmental Variables & Hiding Sensitive Information in Ruby

Environmental Variables & Hiding Sensitive Information in Ruby

20
Comments
3 min read
Okta: G-Suite integration – provisioning and users import and export

Okta: G-Suite integration – provisioning and users import and export

5
Comments
7 min read
Linux security

Linux security

41
Comments
2 min read
Be careful with Docker ports!

Be careful with Docker ports!

13
Comments 18
3 min read
Improving your WordPress development experience

Improving your WordPress development experience

11
Comments
4 min read
Hide Your Keys Hide Your Wife!

Hide Your Keys Hide Your Wife!

12
Comments
5 min read
Why Does Your Mobile App Need An Api Key?

Why Does Your Mobile App Need An Api Key?

11
Comments 2
10 min read
New Cyberspace Search Engine

New Cyberspace Search Engine

16
Comments
3 min read
Github: SAML, Okta, and Github Enterprise Cloud – Organization SSO configuration

Github: SAML, Okta, and Github Enterprise Cloud – Organization SSO configuration

5
Comments
5 min read
Why sign-in with apple may take you more than 5 minutes and how it works?

Why sign-in with apple may take you more than 5 minutes and how it works?

8
Comments 1
4 min read
How to Detect and Fix WordPress Malware Redirect Hack

How to Detect and Fix WordPress Malware Redirect Hack

12
Comments 1
13 min read
My Career Story

My Career Story

77
Comments 11
6 min read
Managing Credentials

Managing Credentials

15
Comments 7
2 min read
I am a Developer Advocate for Security in Mobile Apps and APIs, Ask Me Anything

I am a Developer Advocate for Security in Mobile Apps and APIs, Ask Me Anything

11
Comments 26
1 min read
Awesome Frontend Security

Awesome Frontend Security

9
Comments
1 min read
10 steps for securing a PHP app

10 steps for securing a PHP app

137
Comments 7
3 min read
Is a Master's Degree Worth It?

Is a Master's Degree Worth It?

12
Comments 5
5 min read
Why Opera Browser is Using Webcam?

Why Opera Browser is Using Webcam?

10
Comments 5
1 min read
My First CTF Writeup : KPMG Cyber Security Challenge 2019

My First CTF Writeup : KPMG Cyber Security Challenge 2019

18
Comments
5 min read
How To Stop Account Hijacking

How To Stop Account Hijacking

7
Comments
3 min read
Introducing Aberrant Authentication

Introducing Aberrant Authentication

7
Comments
2 min read
Best practices for Kubernetes security; scaling write-heavy productions; & SRE

Best practices for Kubernetes security; scaling write-heavy productions; & SRE

22
Comments
2 min read
Jenkins: SAML, Okta, user groups, and Role-Based Security plugin

Jenkins: SAML, Okta, user groups, and Role-Based Security plugin

6
Comments 1
5 min read
Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

Sudo Flaw Lets Linux Users Run Commands As Root Even When They're Restricted

8
Comments 1
1 min read
Ruby Dotenv

Ruby Dotenv

9
Comments 2
2 min read
Virtualization for Practical Local Security

Virtualization for Practical Local Security

9
Comments
8 min read
loading...