DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing the AWS Infrastructure

Securing the AWS Infrastructure

2
Comments
4 min read
Lanjutan Lapisan OSI

Lanjutan Lapisan OSI

1
Comments
3 min read
How to Hire an Android Developer for Your Project in 2024

How to Hire an Android Developer for Your Project in 2024

Comments 1
5 min read
Linux commands to analyze DDoS attacks

Linux commands to analyze DDoS attacks

1
Comments
3 min read
Comandos Linux para analisar ataques DDoS

Comandos Linux para analisar ataques DDoS

Comments
3 min read
A Guide to JWTs: Signing with RS256 Made Simple.

A Guide to JWTs: Signing with RS256 Made Simple.

5
Comments 1
3 min read
Day 18: Centralized ELK Stack Setup

Day 18: Centralized ELK Stack Setup

2
Comments 1
2 min read
Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

6
Comments
3 min read
A hands-on lab: Why running as root in Kubernetes containers is dangerous?

A hands-on lab: Why running as root in Kubernetes containers is dangerous?

Comments 2
5 min read
Security-charging Your NextJS 14 App with Userfront Authentication

Security-charging Your NextJS 14 App with Userfront Authentication

1
Comments
8 min read
Security in LLMs: Safeguarding AI Systems - V

Security in LLMs: Safeguarding AI Systems - V

3
Comments
7 min read
Unity Catalog for IRIS Workloads - Collision Theory Confirmed

Unity Catalog for IRIS Workloads - Collision Theory Confirmed

2
Comments
5 min read
What’s the difference between RBAC and ABAC in Fauna?

What’s the difference between RBAC and ABAC in Fauna?

Comments
2 min read
Fighting The Bad Guys in a Fun Way

Fighting The Bad Guys in a Fun Way

1
Comments 2
4 min read
Practical Steps to Enhance Your Security Today

Practical Steps to Enhance Your Security Today

1
Comments
2 min read
Stop Leaking Env Secrets: Your Password Manager Holds the Key

Stop Leaking Env Secrets: Your Password Manager Holds the Key

1
Comments
7 min read
Introduction to Vault

Introduction to Vault

1
Comments
2 min read
Top 5 Security Practices for Web Developers

Top 5 Security Practices for Web Developers

Comments
2 min read
3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

6
Comments
3 min read
How to make “Input validation” easy for your devs

How to make “Input validation” easy for your devs

1
Comments
5 min read
Caption this image! (Azure & CrowdStrike outages)

Caption this image! (Azure & CrowdStrike outages)

11
Comments 3
1 min read
Issue 54 of AWS Cloud Security Weekly

Issue 54 of AWS Cloud Security Weekly

3
Comments
2 min read
Level up your env var tooling in Next.js with DMNO

Level up your env var tooling in Next.js with DMNO

5
Comments
5 min read
Preventing Spammers in Laravel: Using rahulalam31/laravel-abuse-ip Package

Preventing Spammers in Laravel: Using rahulalam31/laravel-abuse-ip Package

1
Comments
2 min read
Enhancing Your Cloud Security Services for Optimal Protection

Enhancing Your Cloud Security Services for Optimal Protection

1
Comments
3 min read
How to Store User Passwords Securely

How to Store User Passwords Securely

3
Comments 1
4 min read
ShellCode 1.0

ShellCode 1.0

1
Comments
3 min read
What we can learn from the faulty CrowdStrike update

What we can learn from the faulty CrowdStrike update

1
Comments
2 min read
Creating users in Amazon Cognito programmatically

Creating users in Amazon Cognito programmatically

Comments
3 min read
Building JWT Auth Chaining with FastAPI and Python

Building JWT Auth Chaining with FastAPI and Python

2
Comments 1
4 min read
CrowdStrike Blew Up the Internet

CrowdStrike Blew Up the Internet

Comments
2 min read
AWS Security Essentials: From Prevention to Detection

AWS Security Essentials: From Prevention to Detection

1
Comments
4 min read
How to stop form spam without using ReCaptcha?

How to stop form spam without using ReCaptcha?

6
Comments 11
2 min read
Security news weekly round-up - 19th July 2024

Security news weekly round-up - 19th July 2024

1
Comments
3 min read
Secure and Resilient Design

Secure and Resilient Design

2
Comments
16 min read
Enhancing OIDC security with demonstrating proof of possession (DPoP)

Enhancing OIDC security with demonstrating proof of possession (DPoP)

15
Comments
3 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

Comments
6 min read
Scenario based practices for securing an AWS S3 bucket.

Scenario based practices for securing an AWS S3 bucket.

8
Comments
2 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

1
Comments
2 min read
Why we built Resourcely

Why we built Resourcely

2
Comments
6 min read
Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

5
Comments
4 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

5
Comments
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

4
Comments
3 min read
Configuring Routes for a Web Application using Azure Firewall (Part 4)

Configuring Routes for a Web Application using Azure Firewall (Part 4)

Comments
2 min read
SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

5
Comments 1
3 min read
Issue 53 of AWS Cloud Security Weekly

Issue 53 of AWS Cloud Security Weekly

5
Comments
1 min read
Simple OAuth 2.0 Framework for Authentication (Freeware)

Simple OAuth 2.0 Framework for Authentication (Freeware)

Comments
1 min read
Security Meetup

Security Meetup

Comments
1 min read
Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

4
Comments
8 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

7
Comments
2 min read
6 Top Courses to Master Software Architecture

6 Top Courses to Master Software Architecture

7
Comments 1
5 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
2 min read
Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
3 min read
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

12
Comments
6 min read
Securing Firebase Connections in Next.js with HTTPS

Securing Firebase Connections in Next.js with HTTPS

Comments
2 min read
Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

13
Comments 1
10 min read
Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

8
Comments
6 min read
loading...