DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Compliance Tools for Cloud Environments

Compliance Tools for Cloud Environments

1
Comments
4 min read
Let's get messy

Let's get messy

Comments
3 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

1
Comments
3 min read
Diving into Bug Bounty Hunting: My Journey Begins with Resources and Tips for Beginners

Diving into Bug Bounty Hunting: My Journey Begins with Resources and Tips for Beginners

Comments
4 min read
NowiPass

NowiPass

Comments
1 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
Securing Your Kubernetes Website with Let's Encrypt and cert-manager

Securing Your Kubernetes Website with Let's Encrypt and cert-manager

Comments
3 min read
Vidéo: faire un projet python qui restera fonctionnel dans 2 mois

Vidéo: faire un projet python qui restera fonctionnel dans 2 mois

Comments
1 min read
Enhancing Mobile Security with Dockerized Environments

Enhancing Mobile Security with Dockerized Environments

2
Comments
3 min read
nsswitch.conf

nsswitch.conf

Comments
4 min read
Anyone Can Become Certified in Cybersecurity

Anyone Can Become Certified in Cybersecurity

Comments
3 min read
Docker Scout in Kubernetes: Advanced Container Security for Cloud-Native Environments

Docker Scout in Kubernetes: Advanced Container Security for Cloud-Native Environments

2
Comments
3 min read
What Okta Bcrypt incident can teach us about designing better APIs

What Okta Bcrypt incident can teach us about designing better APIs

6
Comments 2
14 min read
The NIS Directive and Its Purpose

The NIS Directive and Its Purpose

1
Comments
3 min read
Avoid risky dependencies in AI generated code

Avoid risky dependencies in AI generated code

5
Comments
1 min read
OWASP Top 10: What Every Developer Should Know About It

OWASP Top 10: What Every Developer Should Know About It

Comments
9 min read
Why protect undersea cables?

Why protect undersea cables?

1
Comments
1 min read
How Cerbos minimizes latency in Authorization workflows

How Cerbos minimizes latency in Authorization workflows

Comments
4 min read
Side Notepad Chrome Extension

Side Notepad Chrome Extension

Comments
2 min read
Firebase authentication - Best practices for password requirements

Firebase authentication - Best practices for password requirements

Comments
1 min read
AWS-IAM Beginner perfect guide

AWS-IAM Beginner perfect guide

Comments
13 min read
Hashing, Salting, Cryptography. Help!

Hashing, Salting, Cryptography. Help!

Comments
2 min read
loading...