DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
My AWS Certified Security Specialty Certification Study Guide

My AWS Certified Security Specialty Certification Study Guide

7
Comments 2
3 min read
RootMe CTF

RootMe CTF

1
Comments
3 min read
How to verify GitHub commits with SSH

How to verify GitHub commits with SSH

2
Comments
2 min read
How to pin GitHub Actions to a full commit length SHA across all repositories in your organization

How to pin GitHub Actions to a full commit length SHA across all repositories in your organization

1
Comments
4 min read
Setting up Cloudflare Full (Strict) SSL/TLS on Apache

Setting up Cloudflare Full (Strict) SSL/TLS on Apache

13
Comments
5 min read
FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

Comments
2 min read
Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Comments
3 min read
How (not) to Expose Your Password in Plain Text When Using AWS Transfer Family SFTP

How (not) to Expose Your Password in Plain Text When Using AWS Transfer Family SFTP

Comments
4 min read
have fun with Zeek

have fun with Zeek

Comments
3 min read
CI/CD

CI/CD

Comments
2 min read
New cyber security Crawler

New cyber security Crawler

Comments
2 min read
Guardius: Organizing your resources with Environments, Projects, and Tasks

Guardius: Organizing your resources with Environments, Projects, and Tasks

Comments
3 min read
No le temas a AWS LakeFormation

No le temas a AWS LakeFormation

Comments
2 min read
Should I Build an Open Core Web App Crawler & Pentesting SaaS?

Should I Build an Open Core Web App Crawler & Pentesting SaaS?

Comments
1 min read
How to Track Configuration Changes and Compliance of AWS Resources

How to Track Configuration Changes and Compliance of AWS Resources

2
Comments
3 min read
Simple SIEM Home Lab Using Elastic Cloud

Simple SIEM Home Lab Using Elastic Cloud

7
Comments
4 min read
Essential Android Security Settings to Protect Your Personal Information

Essential Android Security Settings to Protect Your Personal Information

Comments
8 min read
Multi-Factor Authentication (MFA) on AWS: A Critical Security Measure

Multi-Factor Authentication (MFA) on AWS: A Critical Security Measure

4
Comments
2 min read
ICT Security in EU - DORA Delegated Regulation on Oversight Was Published

ICT Security in EU - DORA Delegated Regulation on Oversight Was Published

Comments
1 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
Python for OSINT: Stalking the Internet Like a Pro

Python for OSINT: Stalking the Internet Like a Pro

5
Comments
2 min read
Filtering out unwanted website traffic to improve website SEO statistics and improve web application performance

Filtering out unwanted website traffic to improve website SEO statistics and improve web application performance

Comments
3 min read
Security news weekly round-up - 14th March 2025

Security news weekly round-up - 14th March 2025

1
Comments
2 min read
5 Tricks to Secure your Docker Images

5 Tricks to Secure your Docker Images

19
Comments
3 min read
CORS Done Wrong? Say Hello to Security Risks!

CORS Done Wrong? Say Hello to Security Risks!

3
Comments 4
3 min read
loading...