DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hack the box - Dancing (SMB)

Hack the box - Dancing (SMB)

Comments
2 min read
15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

15-Year Cybersecurity Career Journey: from newbie to CISO and Startup Owner

Comments
32 min read
AWS Security: KMS Keys

AWS Security: KMS Keys

1
Comments
2 min read
Composer Install or Update? Best Practices for Safely Updating Composer in Production

Composer Install or Update? Best Practices for Safely Updating Composer in Production

2
Comments
2 min read
AWS WAF Security Basics

AWS WAF Security Basics

Comments
3 min read
The Octocat Isn’t What It Seems

The Octocat Isn’t What It Seems

Comments
4 min read
The Silent Risk Inside Your Enterprise Security: Why CISOs Must Replace Shadow AI with Sovereign AI

The Silent Risk Inside Your Enterprise Security: Why CISOs Must Replace Shadow AI with Sovereign AI

8
Comments
4 min read
WTF is Confidential Computing?

WTF is Confidential Computing?

3
Comments
2 min read
Infoscava Plugin Creator: Expanding Analysis Capabilities

Infoscava Plugin Creator: Expanding Analysis Capabilities

5
Comments
1 min read
How to Protect an Application from Cyber Attacks

How to Protect an Application from Cyber Attacks

5
Comments
2 min read
Reset Windows 10/11 Password Without USB or Reinstall

Reset Windows 10/11 Password Without USB or Reinstall

Comments
3 min read
AWS Network Firewall: Your Shield for a Secure Cloud

AWS Network Firewall: Your Shield for a Secure Cloud

Comments
6 min read
Are We Letting Social Media Raise Our Children?

Are We Letting Social Media Raise Our Children?

Comments
2 min read
The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

The Complete Guide to HTTP Cookies: What Every Web Developer Must Know

Comments 2
15 min read
How to Choose the Right Authentication Method for Your Backend

How to Choose the Right Authentication Method for Your Backend

4
Comments 1
4 min read
🔐 Kubernetes Secrets & ConfigMaps: Securely Manage Your App Configurations

🔐 Kubernetes Secrets & ConfigMaps: Securely Manage Your App Configurations

5
Comments
3 min read
Creating a extremely secure hacker-proof system

Creating a extremely secure hacker-proof system

3
Comments
4 min read
Laravel Vulnerability Scanner – Scan for CVEs, .env, SQLi, and More

Laravel Vulnerability Scanner – Scan for CVEs, .env, SQLi, and More

Comments
1 min read
How I created a successful recon tool for bug hunters and how you can build one too

How I created a successful recon tool for bug hunters and how you can build one too

Comments
10 min read
Implementing Secure Breakglass Access for ArgoCD with Vault, External Secrets, and Terraform

Implementing Secure Breakglass Access for ArgoCD with Vault, External Secrets, and Terraform

2
Comments
3 min read
AWS VPC : Basics Of VPC Network Security

AWS VPC : Basics Of VPC Network Security

Comments
4 min read
Automating Solidity Smart Contract Security on Windows and Linux

Automating Solidity Smart Contract Security on Windows and Linux

Comments
2 min read
7 Things You Must Do After Installing SafeLine

7 Things You Must Do After Installing SafeLine

5
Comments
2 min read
How to check SSL/TLS cipher suites on your website with nmap

How to check SSL/TLS cipher suites on your website with nmap

Comments
1 min read
Building a Secure AWS Environment: Real Threats, Real Fixes

Building a Secure AWS Environment: Real Threats, Real Fixes

Comments
3 min read
loading...