DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to disable Spring Security for static resources

How to disable Spring Security for static resources

Comments
2 min read
Cryptography Concepts Simplified

Cryptography Concepts Simplified

Comments
2 min read
Security news weekly round-up - 16th August 2024

Security news weekly round-up - 16th August 2024

1
Comments
3 min read
Navigating the Security Risks of Arbitrary Values in Tailwind CSS

Navigating the Security Risks of Arbitrary Values in Tailwind CSS

10
Comments
3 min read
Trust but verify

Trust but verify

1
Comments
4 min read
Day 26 of my 90-Day Devops: Kubernetes Secrets and Access Control

Day 26 of my 90-Day Devops: Kubernetes Secrets and Access Control

6
Comments
4 min read
SSO and RBAC: A Secure Access Strategy for your Kubernetes

SSO and RBAC: A Secure Access Strategy for your Kubernetes

1
Comments
6 min read
Enhancing Your Azure Arc Enabled Server Security with Microsoft Defender for Cloud

Enhancing Your Azure Arc Enabled Server Security with Microsoft Defender for Cloud

5
Comments
2 min read
How to avoid one of the biggest risks in mobile security as an iOS developer

How to avoid one of the biggest risks in mobile security as an iOS developer

Comments
6 min read
Top 10 Cloud Security Startups to Watch in 2024

Top 10 Cloud Security Startups to Watch in 2024

8
Comments
6 min read
EnvLock: The Ultimate Env Manager

EnvLock: The Ultimate Env Manager

7
Comments 2
4 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Code Smell 261 - DigiCert Underscores

Code Smell 261 - DigiCert Underscores

3
Comments
2 min read
Supercharging API Security: APISIX with OpenFGA

Supercharging API Security: APISIX with OpenFGA

1
Comments
5 min read
Day 25: Container Security with Trivy - My 90 Days of DevOps Journey

Day 25: Container Security with Trivy - My 90 Days of DevOps Journey

3
Comments
4 min read
Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

1
Comments
3 min read
How to secure Terraform code with Trivy

How to secure Terraform code with Trivy

2
Comments
15 min read
Understanding the Basics of Network Security: A Guide for Beginners🔍

Understanding the Basics of Network Security: A Guide for Beginners🔍

1
Comments
2 min read
The sad story of node update!

The sad story of node update!

1
Comments 1
3 min read
AWS Lambda with CloudFront configuration guide

AWS Lambda with CloudFront configuration guide

1
Comments
9 min read
Implementing JWT Authentication with Express, MongoDB, and Passport.js

Implementing JWT Authentication with Express, MongoDB, and Passport.js

6
Comments
14 min read
Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

Securi-Taco Tuesdays Livestream Recap: Software Supply Chain 101 with Luke Hinds

4
Comments
4 min read
🔐🛡️ Var, Let, Const: How Declaration Choices Affect Your Code's Security

🔐🛡️ Var, Let, Const: How Declaration Choices Affect Your Code's Security

Comments
3 min read
Simple way to store secrets in Android Project.

Simple way to store secrets in Android Project.

4
Comments
2 min read
🛡️An Introduction to Secure Coding Practices🛡️

🛡️An Introduction to Secure Coding Practices🛡️

2
Comments
2 min read
Implementing a Dynamic RBAC System for Enterprise Applications - Simplified

Implementing a Dynamic RBAC System for Enterprise Applications - Simplified

1
Comments
4 min read
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

2
Comments
8 min read
Securing Kubernetes Production: Avoid These 11 Common Misconfigurations

Securing Kubernetes Production: Avoid These 11 Common Misconfigurations

1
Comments
8 min read
Extensive threat detection and monitoring features of AWS Security Services

Extensive threat detection and monitoring features of AWS Security Services

1
Comments
8 min read
Uncomplicated Firewall (UFW)

Uncomplicated Firewall (UFW)

2
Comments 1
5 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
An Opinionated Ramp Up Guide to AWS Pentesting

An Opinionated Ramp Up Guide to AWS Pentesting

1
Comments
15 min read
How to Implement HashiCorp Vault SSH Secrets Engine for securing SSH access

How to Implement HashiCorp Vault SSH Secrets Engine for securing SSH access

1
Comments
4 min read
3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

3rd Anniversary Fun Activity: TECNO Security Bug Bounty Rules Challenging Test

Comments
1 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Segunda parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Segunda parte

Comments
5 min read
Server Certificate Chain

Server Certificate Chain

Comments
3 min read
Effective Strategies for MySQL User Management

Effective Strategies for MySQL User Management

Comments
1 min read
Make your App 10x Secure with Arcjet Protection Layer

Make your App 10x Secure with Arcjet Protection Layer

46
Comments 7
22 min read
Intersection of AI and Data Privacy

Intersection of AI and Data Privacy

2
Comments
4 min read
[picoctf]Binary Search writeup

[picoctf]Binary Search writeup

11
Comments
1 min read
[picoctf] Scan Surprise writeup

[picoctf] Scan Surprise writeup

2
Comments
1 min read
Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

Introducing the TryHackMe Badge Action Workflow: Automate Your Security Achievements Display

9
Comments
3 min read
Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Comments
1 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
Security news weekly round-up - 9th August 2024

Security news weekly round-up - 9th August 2024

Comments
5 min read
Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

Secure Your AI Project With Model Attestation and Software Bill of Materials (SBOMs)

57
Comments
6 min read
An introduction to Postgres Row Level Security (RLS)

An introduction to Postgres Row Level Security (RLS)

6
Comments
2 min read
Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

2
Comments
4 min read
Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

Cryptojs vs. Bcryptjs: Which password hashing method should you trust?

7
Comments
2 min read
Commentary on CrowdStrike BSOD Root Cause Analysis Release

Commentary on CrowdStrike BSOD Root Cause Analysis Release

Comments
1 min read
Common Issues and Resolutions When Setting Up a VPC in AWS

Common Issues and Resolutions When Setting Up a VPC in AWS

Comments
3 min read
High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

High-Traffic Website Protection: How Leading Platforms Secure Their Traffic

5
Comments
5 min read
Issue 57 & 58 of AWS Cloud Security Weekly

Issue 57 & 58 of AWS Cloud Security Weekly

1
Comments 1
2 min read
Simple and Easy-to-Use Web Security Gateway

Simple and Easy-to-Use Web Security Gateway

5
Comments
2 min read
Building an Authentication System with MERN

Building an Authentication System with MERN

1
Comments
4 min read
Achieving Sustainable Development Goals through Green Building Standards

Achieving Sustainable Development Goals through Green Building Standards

3
Comments
4 min read
How we use Kubernetes jobs to scale OpenSSF Scorecard

How we use Kubernetes jobs to scale OpenSSF Scorecard

12
Comments
7 min read
Understanding Linux Permissions

Understanding Linux Permissions

17
Comments
2 min read
Securing the Cloud #32

Securing the Cloud #32

Comments
5 min read
loading...