DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
Upgrading Simple Shells to Fully Interactive TTYs

Upgrading Simple Shells to Fully Interactive TTYs

1
Comments
2 min read
Amazon Simple Storage Service (S3)

Amazon Simple Storage Service (S3)

7
Comments 5
3 min read
Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Comments
2 min read
Understanding the different types of SSH Keys

Understanding the different types of SSH Keys

10
Comments
3 min read
Introducing the AWS CDK L2 Construct: Simplified Security for Amazon CloudFront with Origin Access Control (OAC)

Introducing the AWS CDK L2 Construct: Simplified Security for Amazon CloudFront with Origin Access Control (OAC)

1
Comments
3 min read
Kubernetes Custom Resources

Kubernetes Custom Resources

6
Comments
7 min read
Amazon Inspector Explained: Boosting Cloud Security for Your AWS Workloads

Amazon Inspector Explained: Boosting Cloud Security for Your AWS Workloads

11
Comments 1
6 min read
Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

4
Comments
6 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
Part 1/3: Fundamentals of Web Security in Frontend Development

Part 1/3: Fundamentals of Web Security in Frontend Development

Comments
4 min read
Part 3/3: Advanced Frontend Security Techniques and Tools

Part 3/3: Advanced Frontend Security Techniques and Tools

1
Comments
2 min read
Web Security in Frontend Development: A 3-Part Series for Developers

Web Security in Frontend Development: A 3-Part Series for Developers

2
Comments
2 min read
Part 2/3: Practical Steps to Secure Frontend Applications

Part 2/3: Practical Steps to Secure Frontend Applications

1
Comments
3 min read
A Definitive Guide to API Pentesting by Sekurno

A Definitive Guide to API Pentesting by Sekurno

8
Comments
10 min read
Implement Unrecognized Device Login Alerts in React

Implement Unrecognized Device Login Alerts in React

1
Comments
3 min read
Common Website Security Risks and How to Avoid Them

Common Website Security Risks and How to Avoid Them

Comments 1
5 min read
AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats

AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats

3
Comments
8 min read
Deep Dive 🤿: Where Does Grype Data Come From?

Deep Dive 🤿: Where Does Grype Data Come From?

7
Comments 3
8 min read
Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

6
Comments 1
3 min read
Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

1
Comments
3 min read
Your dependencies have dependencies: new features to assess risk

Your dependencies have dependencies: new features to assess risk

13
Comments
2 min read
The Importance of Regular Software Updates and Patching Vulnerabilities

The Importance of Regular Software Updates and Patching Vulnerabilities

Comments
4 min read
Secret Linux Commands:

Secret Linux Commands:

Comments 1
1 min read
LINUX CHALLENGE DAY 5

LINUX CHALLENGE DAY 5

1
Comments 3
1 min read
loading...