DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Azure PostgreSQL, Entra ID Authentication and .NET

Azure PostgreSQL, Entra ID Authentication and .NET

9
Comments
8 min read
AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and Authorization

2
Comments
15 min read
Flutter: Best Practices for API Key Security ✅

Flutter: Best Practices for API Key Security ✅

19
Comments
5 min read
Issue 42 of AWS Cloud Security Weekly

Issue 42 of AWS Cloud Security Weekly

2
Comments
2 min read
重置 Linux root 密碼

重置 Linux root 密碼

Comments
1 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

1
Comments
15 min read
JavaScript Security: Simple Practices to Secure Your Frontend

JavaScript Security: Simple Practices to Secure Your Frontend

298
Comments 20
3 min read
Rebuilding TensorFlow 2.8.4 on Ubuntu 22.04 to patch vulnerabilities

Rebuilding TensorFlow 2.8.4 on Ubuntu 22.04 to patch vulnerabilities

2
Comments
7 min read
Advanced CI/CD Pipeline Configuration Strategies

Advanced CI/CD Pipeline Configuration Strategies

138
Comments 13
9 min read
** Autenticación en Aplicaciones Web: Explicado al estilo de Beavis & Butthead **🔐

** Autenticación en Aplicaciones Web: Explicado al estilo de Beavis & Butthead **🔐

Comments
8 min read
Data Encryption

Data Encryption

1
Comments
2 min read
How to secure a WordPress site: auditing and monitoring tools

How to secure a WordPress site: auditing and monitoring tools

9
Comments
8 min read
Upstream preview: Life after the xz utils backdoor hack

Upstream preview: Life after the xz utils backdoor hack

1
Comments
3 min read
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Implementing Role Based Access Control in SvelteKit

Implementing Role Based Access Control in SvelteKit

28
Comments
12 min read
Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Comments
2 min read
Public IP Over VPN in Azure

Public IP Over VPN in Azure

Comments
5 min read
Row Level Security In SQL Server

Row Level Security In SQL Server

Comments
3 min read
Dotenvx with Docker, the better way to manage project environment variables with secrets

Dotenvx with Docker, the better way to manage project environment variables with secrets

4
Comments
8 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

1
Comments
10 min read
Security Protocol to connect AWS SES

Security Protocol to connect AWS SES

Comments
3 min read
Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

Comments
3 min read
What is AWS Identity and Access Management (IAM)?

What is AWS Identity and Access Management (IAM)?

Comments
7 min read
Entenda o que é CORS (Cross-Origin Resource Sharing)

Entenda o que é CORS (Cross-Origin Resource Sharing)

2
Comments
3 min read
Blocking unsafe open source dependencies in pull requests with Minder and OSV.dev

Blocking unsafe open source dependencies in pull requests with Minder and OSV.dev

2
Comments
1 min read
Overview of AWS Config: Concepts and Components

Overview of AWS Config: Concepts and Components

1
Comments
8 min read
Security considerations of configuration management

Security considerations of configuration management

5
Comments
4 min read
The Pyramid of Pain: A Threat Intelligence Concept

The Pyramid of Pain: A Threat Intelligence Concept

2
Comments
1 min read
Security: You might want to quit peppering Passwords Now!

Security: You might want to quit peppering Passwords Now!

4
Comments
2 min read
Security Best Practices in Web Development

Security Best Practices in Web Development

5
Comments
2 min read
Less Time Learning, More Time Building

Less Time Learning, More Time Building

6
Comments
5 min read
Simple + Secure Password Generator with Python🔐

Simple + Secure Password Generator with Python🔐

1
Comments
1 min read
Can Artificial Intelligence Be Trusted With Our Security?

Can Artificial Intelligence Be Trusted With Our Security?

Comments
4 min read
How AWS Shield Protects You From DDoS?

How AWS Shield Protects You From DDoS?

1
Comments
5 min read
What's New With AWS Security? | March Edition

What's New With AWS Security? | March Edition

1
Comments
3 min read
How To Manage IAM Access Analyzer in AWS Organizations Using Terraform

How To Manage IAM Access Analyzer in AWS Organizations Using Terraform

2
Comments
5 min read
Easy AWS permissions for your EKS workloads: Pod Identity - An easy way to grant AWS access

Easy AWS permissions for your EKS workloads: Pod Identity - An easy way to grant AWS access

21
Comments
4 min read
Implementing SSL Pinning in Flutter

Implementing SSL Pinning in Flutter

14
Comments 2
2 min read
Issue 41 of AWS Cloud Security Weekly

Issue 41 of AWS Cloud Security Weekly

1
Comments
2 min read
Amazon Macie to detect sensitive data from your S3 Buckets

Amazon Macie to detect sensitive data from your S3 Buckets

13
Comments
4 min read
Turning Secure Access Into Child’s Play with Permit Access Request APIs

Turning Secure Access Into Child’s Play with Permit Access Request APIs

Comments
5 min read
How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

How to Add Authorization and Protect Your Application With OpenAM and OpenIG Stack

Comments
6 min read
AWS IAM Identity Center Permission Management at Scale Part 3

AWS IAM Identity Center Permission Management at Scale Part 3

2
Comments
5 min read
Unleashing the Value of Data: A Journey into Data Monetization

Unleashing the Value of Data: A Journey into Data Monetization

1
Comments
2 min read
My personal AWS account setup - IAM Identity Center, temporary credentials and sandbox account

My personal AWS account setup - IAM Identity Center, temporary credentials and sandbox account

32
Comments 2
4 min read
Ann Otter Way To Secure Exchange

Ann Otter Way To Secure Exchange

1
Comments
2 min read
Security news weekly round-up - 24 May 2024

Security news weekly round-up - 24 May 2024

1
Comments
4 min read
Angular code obfuscation made easy

Angular code obfuscation made easy

8
Comments
3 min read
picoCTF "MATRIX" Walkthrough (Caution: an extremely lengthy post)

picoCTF "MATRIX" Walkthrough (Caution: an extremely lengthy post)

1
Comments
22 min read
API Gateways: The Impact on API Management and Security

API Gateways: The Impact on API Management and Security

2
Comments
5 min read
Mastering Secure CI/CD for ECS with GitHub Actions

Mastering Secure CI/CD for ECS with GitHub Actions

66
Comments 12
7 min read
Information Technology & Services: Streamlining Operations with Cloud Solutions

Information Technology & Services: Streamlining Operations with Cloud Solutions

Comments
2 min read
Network policy at scale; scaling Calico to 15k+ nodes and 10k network policies

Network policy at scale; scaling Calico to 15k+ nodes and 10k network policies

Comments
1 min read
Red Hat Enterprise Linux on AWS Cloud

Red Hat Enterprise Linux on AWS Cloud

3
Comments 2
9 min read
Password Managers - The Future of Logins.

Password Managers - The Future of Logins.

19
Comments 3
2 min read
Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Using eBPF and XDP to Share Default DNS Port Between Multiple Resolvers

Comments
13 min read
Securing Your Application: A Comprehensive Guide for Developers

Securing Your Application: A Comprehensive Guide for Developers

1
Comments
3 min read
Is Closed-Source Software Really More Secure?

Is Closed-Source Software Really More Secure?

Comments
3 min read
Boost your Cloud Security with Network ACLs in your VPC

Boost your Cloud Security with Network ACLs in your VPC

1
Comments
3 min read
loading...