DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Security in Insecure world

Security in Insecure world

9
Comments 1
10 min read
Be Prepared! Common Web Application Security Vulnerabilities

Be Prepared! Common Web Application Security Vulnerabilities

8
Comments
5 min read
Security Using Spring and JWT

Security Using Spring and JWT

7
Comments
16 min read
Fingerprinting Your Data

Fingerprinting Your Data

18
Comments 5
4 min read
Pushing Left, Like a Boss — Part 5.5 — File Uploads

Pushing Left, Like a Boss — Part 5.5 — File Uploads

14
Comments
2 min read
What to expect from AWS RE:Inforce?

What to expect from AWS RE:Inforce?

4
Comments 1
1 min read
Angular Authentication using JWT (JSON Web Token)

Angular Authentication using JWT (JSON Web Token)

41
Comments
1 min read
The One Thing You Should Do After Building Best-Practice Docker Image (in 3 minutes)

The One Thing You Should Do After Building Best-Practice Docker Image (in 3 minutes)

9
Comments 1
5 min read
Restrict specific fields updation in Firebase Firestore

Restrict specific fields updation in Firebase Firestore

18
Comments 5
4 min read
How to keep secure your Docker Image

How to keep secure your Docker Image

24
Comments
4 min read
Pushing Left, Like a Boss — Part 5.4 — Session Management

Pushing Left, Like a Boss — Part 5.4 — Session Management

16
Comments 1
1 min read
Webassembly is good but doesn't the thought scare you that sites will now be able to run full binary programs on your devices?

Webassembly is good but doesn't the thought scare you that sites will now be able to run full binary programs on your devices?

2
Comments 5
1 min read
How to secure JWT token in React?

How to secure JWT token in React?

20
Comments 6
1 min read
Hackitect series vol.2 - Open source cybersecurity zoo

Hackitect series vol.2 - Open source cybersecurity zoo

12
Comments
5 min read
Package signing in PIP - It works, in a roundabout sort of way

Package signing in PIP - It works, in a roundabout sort of way

3
Comments 3
3 min read
Presentation Tips for Technical Talks

Presentation Tips for Technical Talks

295
Comments 11
5 min read
Preventing malicious authentication attempts while avoiding CAPTCHAs.

Preventing malicious authentication attempts while avoiding CAPTCHAs.

11
Comments 8
5 min read
Return Oriented Programming on ARM (32-bit)

Return Oriented Programming on ARM (32-bit)

31
Comments
5 min read
Pushing Left, Like a Boss — Part 5.3 — Browser and Client-Side Hardening

Pushing Left, Like a Boss — Part 5.3 — Browser and Client-Side Hardening

36
Comments
2 min read
Deconstructing OnlyKey Agent

Deconstructing OnlyKey Agent

12
Comments 3
1 min read
A fun little video about Security concepts for beginners

A fun little video about Security concepts for beginners

14
Comments
2 min read
Get serious about Data Governance now, or it will cost ALL of us in the future.

Get serious about Data Governance now, or it will cost ALL of us in the future.

14
Comments
5 min read
Simple Authentication with Spring Security

Simple Authentication with Spring Security

13
Comments 1
12 min read
AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

7
Comments
5 min read
6 Ways We Get Things Done with Python

6 Ways We Get Things Done with Python

11
Comments
3 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Content-Security-Policy in ASP.NET MVC

Content-Security-Policy in ASP.NET MVC

7
Comments
3 min read
Privacy and Security Series, Part II: Multi-factor Authentication

Privacy and Security Series, Part II: Multi-factor Authentication

6
Comments
9 min read
Exploiting Common Serverless Security Flaws in AWS

Exploiting Common Serverless Security Flaws in AWS

7
Comments 2
11 min read
OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

10
Comments 1
5 min read
Security in CI/CD

Security in CI/CD

8
Comments
1 min read
The Difference Between Malware, Viruses and Ransomware Explained

The Difference Between Malware, Viruses and Ransomware Explained

18
Comments
2 min read
SSL Certificates in Development

SSL Certificates in Development

6
Comments
3 min read
Q Vault: An open source secret manager

Q Vault: An open source secret manager

7
Comments 27
1 min read
Improving security in ASP.NET MVC using custom headers

Improving security in ASP.NET MVC using custom headers

28
Comments 6
4 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Explain Blockchain Like I'm Five

Explain Blockchain Like I'm Five

16
Comments 2
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Sneaky Fingerprint and IP Tracker with React

Sneaky Fingerprint and IP Tracker with React

52
Comments 1
4 min read
Possibly Odd Approach for Quick Authentication - User Registry API and Passport

Possibly Odd Approach for Quick Authentication - User Registry API and Passport

31
Comments
6 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
Introduction to computer forensics

Introduction to computer forensics

123
Comments 11
5 min read
Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

17
Comments
2 min read
Explain User Token Authentication Like I'm Five

Explain User Token Authentication Like I'm Five

12
Comments 3
1 min read
Let's Encrypt: Wildcard Certificate With Certbot

Let's Encrypt: Wildcard Certificate With Certbot

137
Comments 27
3 min read
How to Create Role based Authorization Middleware with Casbin and Nest.js

How to Create Role based Authorization Middleware with Casbin and Nest.js

39
Comments
2 min read
Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

35
Comments 1
4 min read
What the heck is OCSP?

What the heck is OCSP?

9
Comments
6 min read
Adding permissions without permission

Adding permissions without permission

10
Comments 4
1 min read
Threat Modelling Serverless

Threat Modelling Serverless

40
Comments 3
5 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
Hello, Worm!: Mapping SSH probes with a bash script

Hello, Worm!: Mapping SSH probes with a bash script

49
Comments 8
2 min read
Block malicious login attempts, but preventing account lock-outs.

Block malicious login attempts, but preventing account lock-outs.

19
Comments 12
1 min read
Where do you keep credentials for your Lambda functions?

Where do you keep credentials for your Lambda functions?

87
Comments 45
5 min read
Sankaku Complex XSS

Sankaku Complex XSS

6
Comments
2 min read
Tech writing goals for May 2019

Tech writing goals for May 2019

6
Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

11
Comments 1
1 min read
Azure Sentinel: Taking Security To The Next Level

Azure Sentinel: Taking Security To The Next Level

6
Comments
5 min read
Be educated about today's security.

Be educated about today's security.

47
Comments 3
7 min read
Safe Spaces & WoSEC

Safe Spaces & WoSEC

18
Comments 3
2 min read
loading...