DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

1
Comments
4 min read
Pushed Authorization Requests in .NET 9: Why and How to Use Them

Pushed Authorization Requests in .NET 9: Why and How to Use Them

7
Comments
8 min read
Confidence in the cloud with data sovereignty

Confidence in the cloud with data sovereignty

Comments
3 min read
Issue 79 of AWS Cloud Security Weekly

Issue 79 of AWS Cloud Security Weekly

1
Comments
1 min read
Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

2
Comments
1 min read
Securely access Amazon EKS with GitHub Actions and OpenID Connect

Securely access Amazon EKS with GitHub Actions and OpenID Connect

7
Comments
3 min read
Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

1
Comments
3 min read
Secrets Management in Kubernetes: Best Practices for Security

Secrets Management in Kubernetes: Best Practices for Security

13
Comments
6 min read
HashiCorp Vault Setup Guide for NEAR Protocol Accounts

HashiCorp Vault Setup Guide for NEAR Protocol Accounts

Comments
4 min read
Top 7 Kubernetes Certifications in 2025

Top 7 Kubernetes Certifications in 2025

2
Comments
2 min read
Closing the PKIX Working Group is, apparently, not news

Closing the PKIX Working Group is, apparently, not news

Comments
2 min read
Tools Dependency Injection

Tools Dependency Injection

22
Comments
7 min read
Understanding SSL and Its Importance

Understanding SSL and Its Importance

1
Comments 2
2 min read
3Mór: How we started with Valkyries and ended with a Goddess

3Mór: How we started with Valkyries and ended with a Goddess

1
Comments
2 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
How to Configure Pods to Enable IAM Roles for Service Accounts

How to Configure Pods to Enable IAM Roles for Service Accounts

2
Comments
3 min read
Patching Scheduled Auto Scaling Groups with AWS

Patching Scheduled Auto Scaling Groups with AWS

Comments
5 min read
You May Prefer to Know Less About PKI Flaws but Now Is Too Late

You May Prefer to Know Less About PKI Flaws but Now Is Too Late

Comments
3 min read
Generate your Let's Encrypt Digital Certificates for all your domains using Apache

Generate your Let's Encrypt Digital Certificates for all your domains using Apache

Comments
3 min read
Understanding Passkeys: The Behind-the-Scenes Magic of Passwordless Authentication

Understanding Passkeys: The Behind-the-Scenes Magic of Passwordless Authentication

1
Comments
2 min read
How I automated Certificate expiration alerts with AWS

How I automated Certificate expiration alerts with AWS

12
Comments 1
5 min read
Announcing RODiT API: Revolutionizing API Authentication

Announcing RODiT API: Revolutionizing API Authentication

Comments
1 min read
Managing Secrets in an AWS Serverless Application

Managing Secrets in an AWS Serverless Application

6
Comments
3 min read
What is the Mina Protocol? A Simple Guide

What is the Mina Protocol? A Simple Guide

6
Comments
3 min read
Building a Stronger Security Posture with AWS Security Hub

Building a Stronger Security Posture with AWS Security Hub

1
Comments
6 min read
loading...