DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Open-Source Software Security

Open-Source Software Security

Comments
11 min read
Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

1
Comments
13 min read
Streamlined Guide: Setting Up SSH and GPG Keys on GitHub

Streamlined Guide: Setting Up SSH and GPG Keys on GitHub

1
Comments
3 min read
In pursuit of privacy: What is privacy?

In pursuit of privacy: What is privacy?

4
Comments
3 min read
eBPF: Unleashing Kernel Magic for Modern Infrastructure

eBPF: Unleashing Kernel Magic for Modern Infrastructure

2
Comments 1
5 min read
Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

12
Comments 2
3 min read
Python Security Essentials for Your Apps

Python Security Essentials for Your Apps

10
Comments 5
8 min read
Online Safety: A Guide to Protecting Yourself

Online Safety: A Guide to Protecting Yourself

1
Comments
7 min read
Monoalphabetic and Polyalphabetic Ciphers in Cryptography

Monoalphabetic and Polyalphabetic Ciphers in Cryptography

3
Comments
3 min read
Trick to get Free SSL certificate for azure application gateway

Trick to get Free SSL certificate for azure application gateway

11
Comments
2 min read
Understanding Metamorphic Code

Understanding Metamorphic Code

3
Comments
4 min read
Gaps in SOC Operator and Analyst Skillsets

Gaps in SOC Operator and Analyst Skillsets

Comments
3 min read
Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

4
Comments
6 min read
Prompt Fuzzer: how to keep your agents on the right path

Prompt Fuzzer: how to keep your agents on the right path

1
Comments
2 min read
Building a Fort: Django Security Best Practices

Building a Fort: Django Security Best Practices

4
Comments
7 min read
HTTP / HTTPS Communication Protocol

HTTP / HTTPS Communication Protocol

5
Comments 2
8 min read
Services that can integrate with AWS Certificate Manager and their Use Case

Services that can integrate with AWS Certificate Manager and their Use Case

2
Comments 2
3 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
AWS Detective

AWS Detective

Comments
2 min read
Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

1
Comments
4 min read
Introducing the Ultimate Password Generator: Your Key to Online Security

Introducing the Ultimate Password Generator: Your Key to Online Security

Comments
2 min read
How to Hide the X-Powered-By Header in NestJS

How to Hide the X-Powered-By Header in NestJS

7
Comments 2
1 min read
Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

1
Comments
3 min read
De4py: Advanced python reverse engineering

De4py: Advanced python reverse engineering

4
Comments
2 min read
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
Issue 43 of AWS Cloud Security Weekly

Issue 43 of AWS Cloud Security Weekly

4
Comments
2 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

1
Comments
6 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Securing the Cloud #29

Securing the Cloud #29

5
Comments
3 min read
Password Management: Passwordless Login

Password Management: Passwordless Login

10
Comments 2
8 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

5
Comments
3 min read
The Benefits of Opting Out from Using OfficialUSA.com

The Benefits of Opting Out from Using OfficialUSA.com

1
Comments 1
4 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

14
Comments
9 min read
Are Your Secrets Projects Truly Safe?🔐

Are Your Secrets Projects Truly Safe?🔐

Comments 2
2 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Client assertion in OAuth 2.0 client authentication

Client assertion in OAuth 2.0 client authentication

12
Comments
4 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Threat Modeling for Developers

Threat Modeling for Developers

24
Comments 2
3 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Frontend Web Security - Protecting Against Common Threats

Frontend Web Security - Protecting Against Common Threats

Comments
2 min read
Comparing token-based authentication and session-based authentication

Comparing token-based authentication and session-based authentication

19
Comments 2
4 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

10
Comments
1 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

35
Comments
2 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Syncing AWS Secrets Manager across accounts

Syncing AWS Secrets Manager across accounts

7
Comments
2 min read
Detect AES in ECB mode

Detect AES in ECB mode

1
Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

3
Comments
8 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
loading...