DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Webassembly is good but doesn't the thought scare you that sites will now be able to run full binary programs on your devices?

Webassembly is good but doesn't the thought scare you that sites will now be able to run full binary programs on your devices?

2
Comments 5
1 min read
How to secure JWT token in React?

How to secure JWT token in React?

21
Comments 6
1 min read
Hackitect series vol.2 - Open source cybersecurity zoo

Hackitect series vol.2 - Open source cybersecurity zoo

12
Comments
5 min read
Package signing in PIP - It works, in a roundabout sort of way

Package signing in PIP - It works, in a roundabout sort of way

3
Comments 3
3 min read
Presentation Tips for Technical Talks

Presentation Tips for Technical Talks

295
Comments 11
5 min read
Preventing malicious authentication attempts while avoiding CAPTCHAs.

Preventing malicious authentication attempts while avoiding CAPTCHAs.

11
Comments 8
5 min read
Return Oriented Programming on ARM (32-bit)

Return Oriented Programming on ARM (32-bit)

31
Comments
5 min read
Pushing Left, Like a Boss — Part 5.3 — Browser and Client-Side Hardening

Pushing Left, Like a Boss — Part 5.3 — Browser and Client-Side Hardening

36
Comments
2 min read
Deconstructing OnlyKey Agent

Deconstructing OnlyKey Agent

12
Comments 3
1 min read
A fun little video about Security concepts for beginners

A fun little video about Security concepts for beginners

14
Comments
2 min read
Get serious about Data Governance now, or it will cost ALL of us in the future.

Get serious about Data Governance now, or it will cost ALL of us in the future.

14
Comments
5 min read
Simple Authentication with Spring Security

Simple Authentication with Spring Security

13
Comments 1
12 min read
AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

AWS: IAM users keys rotation, EC2 IAM Roles and Jenkins

7
Comments
5 min read
6 Ways We Get Things Done with Python

6 Ways We Get Things Done with Python

11
Comments
3 min read
Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

Solving Puzzles to Protect the Cloud: CTO Taher Elgamal on His Role at Salesforce and the Future of Cryptography

3
Comments
4 min read
Content-Security-Policy in ASP.NET MVC

Content-Security-Policy in ASP.NET MVC

7
Comments
3 min read
Privacy and Security Series, Part II: Multi-factor Authentication

Privacy and Security Series, Part II: Multi-factor Authentication

6
Comments
9 min read
Exploiting Common Serverless Security Flaws in AWS

Exploiting Common Serverless Security Flaws in AWS

7
Comments 2
11 min read
OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

OpenVPN: Let’s Encrypt DNS verification on AWS Route53 and OpenVPN Access Server SSL certificate auto update

10
Comments 1
5 min read
Security in CI/CD

Security in CI/CD

8
Comments
1 min read
The Difference Between Malware, Viruses and Ransomware Explained

The Difference Between Malware, Viruses and Ransomware Explained

18
Comments
2 min read
SSL Certificates in Development

SSL Certificates in Development

6
Comments
3 min read
Q Vault: An open source secret manager

Q Vault: An open source secret manager

7
Comments 27
1 min read
Improving security in ASP.NET MVC using custom headers

Improving security in ASP.NET MVC using custom headers

29
Comments 6
4 min read
Absolute Security with No Trust

Absolute Security with No Trust

19
Comments 2
5 min read
Explain Blockchain Like I'm Five

Explain Blockchain Like I'm Five

16
Comments 2
2 min read
Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

Pushing Left, Like a Boss — Part 5.2 — Use Safe Dependencies

18
Comments 3
1 min read
Sneaky Fingerprint and IP Tracker with React

Sneaky Fingerprint and IP Tracker with React

52
Comments 1
4 min read
Possibly Odd Approach for Quick Authentication - User Registry API and Passport

Possibly Odd Approach for Quick Authentication - User Registry API and Passport

31
Comments
6 min read
Making easier a NoSQLi pentest

Making easier a NoSQLi pentest

5
Comments
2 min read
Introduction to computer forensics

Introduction to computer forensics

123
Comments 11
5 min read
Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

Analyzing and Preventing Sub-domain Takeovers: Real Risks? Causes?

17
Comments
2 min read
Explain User Token Authentication Like I'm Five

Explain User Token Authentication Like I'm Five

12
Comments 3
1 min read
Let's Encrypt: Wildcard Certificate With Certbot

Let's Encrypt: Wildcard Certificate With Certbot

137
Comments 27
3 min read
How to Create Role based Authorization Middleware with Casbin and Nest.js

How to Create Role based Authorization Middleware with Casbin and Nest.js

39
Comments
2 min read
Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

Cloud providers manage your compute, storage, and network. But who manages your open source libraries? 🤔

35
Comments 1
4 min read
What the heck is OCSP?

What the heck is OCSP?

9
Comments
6 min read
Adding permissions without permission

Adding permissions without permission

10
Comments 4
1 min read
Threat Modelling Serverless

Threat Modelling Serverless

40
Comments 3
5 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

10
Comments
1 min read
Hello, Worm!: Mapping SSH probes with a bash script

Hello, Worm!: Mapping SSH probes with a bash script

49
Comments 8
2 min read
Block malicious login attempts, but preventing account lock-outs.

Block malicious login attempts, but preventing account lock-outs.

19
Comments 12
1 min read
Where do you keep credentials for your Lambda functions?

Where do you keep credentials for your Lambda functions?

88
Comments 45
5 min read
Sankaku Complex XSS

Sankaku Complex XSS

6
Comments
2 min read
Tech writing goals for May 2019

Tech writing goals for May 2019

6
Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

11
Comments 1
1 min read
Azure Sentinel: Taking Security To The Next Level

Azure Sentinel: Taking Security To The Next Level

6
Comments
5 min read
Be educated about today's security.

Be educated about today's security.

47
Comments 3
7 min read
Safe Spaces & WoSEC

Safe Spaces & WoSEC

18
Comments 3
2 min read
Easy Single Sign-On with Spring Boot and OAuth 2.0

Easy Single Sign-On with Spring Boot and OAuth 2.0

15
Comments
10 min read
Secure your apps with Angular Directive when using target='_blank'

Secure your apps with Angular Directive when using target='_blank'

13
Comments 4
2 min read
Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

Bitwarden: an organization’s password manager self-hosted version installation on an AWS EC2

6
Comments
18 min read
Is the OAuth 2.0 Implicit Flow Dead?

Is the OAuth 2.0 Implicit Flow Dead?

11
Comments
12 min read
How to improve the security of your Netlify site?

How to improve the security of your Netlify site?

15
Comments 2
2 min read
Introduction to Linux Hardening

Introduction to Linux Hardening

192
Comments 10
3 min read
Spawn a Jenkins from code

Spawn a Jenkins from code

6
Comments 1
7 min read
Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

Linux: GPG-keys, Pass – passwords manager, and passwords import from a KeePass database

45
Comments 9
10 min read
Building Rootless Applications and Services

Building Rootless Applications and Services

7
Comments 1
6 min read
If Gmail says "Our system has detected that this message does not meet IPv6 sending guidelines regarding PTR records"

If Gmail says "Our system has detected that this message does not meet IPv6 sending guidelines regarding PTR records"

2
Comments
1 min read
Tutorial: Build Universal Applications with Nuxt.js

Tutorial: Build Universal Applications with Nuxt.js

12
Comments
15 min read
loading...