DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
Ionic + Capacitor Security Tips

Ionic + Capacitor Security Tips

7
Comments 1
3 min read
How to resolve vulnerabilities in Front-End Applications

How to resolve vulnerabilities in Front-End Applications

5
Comments
4 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

13
Comments
7 min read
Training data poisoning to get what you want in LLMs, A Question

Training data poisoning to get what you want in LLMs, A Question

Comments
2 min read
Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

26
Comments
3 min read
Dynamic AWS IAM Policies

Dynamic AWS IAM Policies

Comments
4 min read
Understanding How NGINX and HAProxy Improve Response Times (DDoS Testing)

Understanding How NGINX and HAProxy Improve Response Times (DDoS Testing)

Comments
1 min read
Proxy VS Reverse Proxy

Proxy VS Reverse Proxy

15
Comments 6
4 min read
Transfer contents and files using SCP from remote to local machine via bastion

Transfer contents and files using SCP from remote to local machine via bastion

8
Comments
2 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

6
Comments
8 min read
The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

Comments
3 min read
How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

1
Comments
5 min read
Share Objects from Private S3 Buckets using CloudFront

Share Objects from Private S3 Buckets using CloudFront

Comments
11 min read
Using WordPress Nonces

Using WordPress Nonces

Comments
4 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

78
Comments 3
12 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

5
Comments
2 min read
Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

18
Comments
8 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

17
Comments 6
5 min read
GitHub Security Best Practices Every Developer Should Know

GitHub Security Best Practices Every Developer Should Know

41
Comments 6
4 min read
Securing Grafana for Web Access

Securing Grafana for Web Access

2
Comments
5 min read
OAuth2 explained: Bob's tale

OAuth2 explained: Bob's tale

1
Comments
2 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

12
Comments
8 min read
loading...