DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Best Python Libraries for Cybersecurity in 2024

Best Python Libraries for Cybersecurity in 2024

12
Comments 8
13 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

290
Comments 1
10 min read
A primer on open-source intelligence for bug bounty hunting in Grafana

A primer on open-source intelligence for bug bounty hunting in Grafana

5
Comments
10 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

Comments
2 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

Comments 2
2 min read
Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

Comments
2 min read
Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

1
Comments
8 min read
OAuth 2.1 is Here: What You Need to Know

OAuth 2.1 is Here: What You Need to Know

17
Comments
6 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Using the Trusty API to discover deprecated and malicious packages.

Using the Trusty API to discover deprecated and malicious packages.

3
Comments
2 min read
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

13
Comments
2 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

4
Comments
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

2
Comments
2 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

6
Comments 2
4 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

21
Comments 2
2 min read
.NET 8.0 - Securing the API with JWT Bearer Token

.NET 8.0 - Securing the API with JWT Bearer Token

127
Comments 1
5 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

Comments
5 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

19
Comments 1
5 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

1
Comments
2 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
Dev: Security

Dev: Security

Comments
3 min read
Integrating reCAPTCHA v3 in Next.js

Integrating reCAPTCHA v3 in Next.js

22
Comments 2
2 min read
CodeBehind 2.7 Released, Role Access Added!

CodeBehind 2.7 Released, Role Access Added!

1
Comments
7 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Proposal - Blockchain Coordination

Proposal - Blockchain Coordination

Comments
5 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

5
Comments
7 min read
Types of Computer Security Threats

Types of Computer Security Threats

1
Comments
8 min read
Mastering Cloudflare Ruleset Engine with Terraform

Mastering Cloudflare Ruleset Engine with Terraform

10
Comments 1
5 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Security news weekly round-up - 14th June 2024

Security news weekly round-up - 14th June 2024

1
Comments
3 min read
5 Essential Cybersecurity Tips to Secure Your Business in 2024

5 Essential Cybersecurity Tips to Secure Your Business in 2024

1
Comments
3 min read
Build an Antivirus with Python (Beginners Guide)

Build an Antivirus with Python (Beginners Guide)

12
Comments
9 min read
All About Web Security

All About Web Security

2
Comments
3 min read
Enabling Workload Identity Federation for Github Actions on GCP

Enabling Workload Identity Federation for Github Actions on GCP

Comments
1 min read
Understanding API Keys, JWT, and Secure Authentication Methods

Understanding API Keys, JWT, and Secure Authentication Methods

4
Comments
3 min read
Build OAuth 2.0 Server & API Server with Authlete + Spring Boot

Build OAuth 2.0 Server & API Server with Authlete + Spring Boot

2
Comments
4 min read
BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

BSides Knoxville 2024: A Community Celebrating A Decade of Cybersecurity

2
Comments 1
5 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices

Comments 1
7 min read
Building a Fort Knox DevSecOps: Comprehensive Security Practices

Building a Fort Knox DevSecOps: Comprehensive Security Practices

21
Comments
10 min read
FindAll - Automated analysis of network security emergency response tools.

FindAll - Automated analysis of network security emergency response tools.

2
Comments
3 min read
TECNO Web Security Challenge Campaign starts now

TECNO Web Security Challenge Campaign starts now

2
Comments
1 min read
Fine-Grained Access Control (FGAC): Comprehensive Guidance

Fine-Grained Access Control (FGAC): Comprehensive Guidance

16
Comments
13 min read
Announcements from AWS re:Inforce 2024 Keynote

Announcements from AWS re:Inforce 2024 Keynote

4
Comments 1
6 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
NodeJS Security Middlewares

NodeJS Security Middlewares

1
Comments
2 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

4
Comments 1
2 min read
Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest

Rising Like A Phoenix, ShowMeCon 2024 Resurrects A Security Community In The Midwest

1
Comments
6 min read
How to identify a phishing Email in 2024

How to identify a phishing Email in 2024

9
Comments 2
6 min read
What is HashiCorp Vault?

What is HashiCorp Vault?

Comments
3 min read
My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

2
Comments
5 min read
Issue 47 and 48 of AWS Cloud Security Weekly

Issue 47 and 48 of AWS Cloud Security Weekly

3
Comments
3 min read
loading...