DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering `is.boolean` for Type Checking in JavaScript with 'thiis': Fun Examples and Useful Tips

Mastering `is.boolean` for Type Checking in JavaScript with 'thiis': Fun Examples and Useful Tips

6
Comments 1
4 min read
Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
Discover how to find hidden buckets in Amazon S3 Cloud.

Discover how to find hidden buckets in Amazon S3 Cloud.

1
Comments
9 min read
Prevent malicious Terraform Providers

Prevent malicious Terraform Providers

Comments
2 min read
Ruby on Rails password validation

Ruby on Rails password validation

Comments
1 min read
AWS Lambda Permissions: Resource-Based Policies vs. IAM Roles

AWS Lambda Permissions: Resource-Based Policies vs. IAM Roles

5
Comments
4 min read
Guarding the Digital Fortress: A Comprehensive Guide to Intrusion Detection and Prevention Systems

Guarding the Digital Fortress: A Comprehensive Guide to Intrusion Detection and Prevention Systems

Comments
11 min read
Enhancing Deployment Security through the Integration of IAM Roles and GitHub Actions

Enhancing Deployment Security through the Integration of IAM Roles and GitHub Actions

5
Comments
3 min read
Data Privacy: How Much is too Much to Share for 'Free'?

Data Privacy: How Much is too Much to Share for 'Free'?

1
Comments
2 min read
Implementing Role-Based Access Control in Django

Implementing Role-Based Access Control in Django

17
Comments
7 min read
Badge for Security FAQs: Strengthening Online Trust

Badge for Security FAQs: Strengthening Online Trust

1
Comments
2 min read
Security 101 for developers: TCP/IP, SSL/TLS Certificates, AES/CBC Encryption, Password Storage, and More

Security 101 for developers: TCP/IP, SSL/TLS Certificates, AES/CBC Encryption, Password Storage, and More

13
Comments 1
7 min read
Are Notion Pages Private by Default?

Are Notion Pages Private by Default?

Comments
4 min read
Understand Amazon GuardDuty Findings

Understand Amazon GuardDuty Findings

8
Comments
4 min read
The Next Wave of DevOps: Security as a Team Sport

The Next Wave of DevOps: Security as a Team Sport

9
Comments 2
5 min read
The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

Comments
5 min read
[Hands-On] AWS Lambda function URL with AWS IAM Authentication type

[Hands-On] AWS Lambda function URL with AWS IAM Authentication type

7
Comments
5 min read
My Journey to SC-400 Certification Success

My Journey to SC-400 Certification Success

8
Comments 2
4 min read
Online Robots.txt Validator For Creating a Secure Robots.txt

Online Robots.txt Validator For Creating a Secure Robots.txt

2
Comments
3 min read
Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 2. Secure Static Hosting

Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 2. Secure Static Hosting

6
Comments
5 min read
How to Impersonate a Service Account Using Bigquery Client Library

How to Impersonate a Service Account Using Bigquery Client Library

Comments
2 min read
Navigating CAA DNS Records with AWS: A Deep Dive

Navigating CAA DNS Records with AWS: A Deep Dive

1
Comments
3 min read
Cross Site Scripting attacks (XSS)

Cross Site Scripting attacks (XSS)

7
Comments
5 min read
Using DNS over TLS on openSUSE Linux in 4 easy steps, enable cloud firewall for free today!

Using DNS over TLS on openSUSE Linux in 4 easy steps, enable cloud firewall for free today!

Comments 2
5 min read
Criar IAM Role Cross-Account

Criar IAM Role Cross-Account

5
Comments
6 min read
Risky Click Text Editor Edition

Risky Click Text Editor Edition

1
Comments
1 min read
Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍

Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍

2
Comments
10 min read
Harnessing the Combination of Tailscale and Osquery

Harnessing the Combination of Tailscale and Osquery

Comments
3 min read
Sliver and Cursed Chrome for Post Exploitation

Sliver and Cursed Chrome for Post Exploitation

Comments
5 min read
Securing Secrets in the Age of GitOps

Securing Secrets in the Age of GitOps

Comments
4 min read
Web Security Encryption

Web Security Encryption

1
Comments
4 min read
Detecting Failed Sign In Attempts to AWS and Alerting

Detecting Failed Sign In Attempts to AWS and Alerting

6
Comments 1
7 min read
Password protection for developers: importance and best practices

Password protection for developers: importance and best practices

6
Comments
5 min read
Utilizing SSM Documents for Seamless Tunneling to RDS

Utilizing SSM Documents for Seamless Tunneling to RDS

Comments
2 min read
Controlling access to IAM-protected API endpoints with Cognito groups

Controlling access to IAM-protected API endpoints with Cognito groups

3
Comments
7 min read
Finding the Right Balance in Gradle Dependency Strategy

Finding the Right Balance in Gradle Dependency Strategy

24
Comments 2
11 min read
How to Implement Passkey Authentication and Fine-Grained Authorization in JavaScript

How to Implement Passkey Authentication and Fine-Grained Authorization in JavaScript

14
Comments 1
12 min read
An Introduction to Software Supply Chains for Python Developers - Part 1

An Introduction to Software Supply Chains for Python Developers - Part 1

Comments
4 min read
SQL Injections at Work

SQL Injections at Work

1
Comments
4 min read
Security of Navalny's underground resistance on the Dark Web

Security of Navalny's underground resistance on the Dark Web

11
Comments
16 min read
Linux security LAB Broken Spaceship

Linux security LAB Broken Spaceship

8
Comments 2
1 min read
Overview of Containerization with Docker.

Overview of Containerization with Docker.

Comments
3 min read
Introdução ao SSH

Introdução ao SSH

20
Comments
3 min read
CodeCommit Access from EC2

CodeCommit Access from EC2

Comments
6 min read
Throttling Rails logins with Rack Attack

Throttling Rails logins with Rack Attack

7
Comments 2
2 min read
Secure GitHub Actions by pull_request_target

Secure GitHub Actions by pull_request_target

1
Comments
7 min read
Extensive Guide to Gnu Privacy Guard (GPG)

Extensive Guide to Gnu Privacy Guard (GPG)

1
Comments
10 min read
Web Application Security 101

Web Application Security 101

2
Comments
1 min read
I'm a little iffy on Passkeys

I'm a little iffy on Passkeys

1
Comments
6 min read
JavaScript and Basic Security

JavaScript and Basic Security

7
Comments
3 min read
Gerando certificado SSL com certbot na Oracle Cloud Infrastructure

Gerando certificado SSL com certbot na Oracle Cloud Infrastructure

Comments
2 min read
How APISIX protects against the OWASP top 10 API security threats

How APISIX protects against the OWASP top 10 API security threats

22
Comments
12 min read
7 princípios båsicos de segurança em cloud

7 princípios båsicos de segurança em cloud

Comments
2 min read
Cross-site Scripting and how to fix it

Cross-site Scripting and how to fix it

Comments
4 min read
Running web scraping service securely

Running web scraping service securely

7
Comments
6 min read
The Unrivaled Strength of Java in Powering Backend Technologies

The Unrivaled Strength of Java in Powering Backend Technologies

1
Comments
2 min read
My idea about hardening the cookie storage

My idea about hardening the cookie storage

1
Comments 2
1 min read
Introducing The Border0 Terraform Provider

Introducing The Border0 Terraform Provider

Comments
5 min read
PSRule module for Azure DevOps available for feedback

PSRule module for Azure DevOps available for feedback

1
Comments
1 min read
Cybersecurity and AI deep in the heart of Texas Cyber Summit

Cybersecurity and AI deep in the heart of Texas Cyber Summit

1
Comments
11 min read
loading...