DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

5
Comments
6 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

9
Comments
7 min read
O que é SOAR?

O que é SOAR?

6
Comments
4 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
Safeguarding Avalonia Apps with ByteHide Shield 🛡️

Safeguarding Avalonia Apps with ByteHide Shield 🛡️

2
Comments
2 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

6
Comments
2 min read
Database Encryption: Secure Your Data with Best Practices

Database Encryption: Secure Your Data with Best Practices

1
Comments
1 min read
Locally test and validate your Renovate configuration files

Locally test and validate your Renovate configuration files

Comments
3 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

4
Comments
13 min read
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
JWT Explained

JWT Explained

68
Comments 15
3 min read
Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Comments
5 min read
AppArmor testsuite

AppArmor testsuite

1
Comments
1 min read
Security news weekly round-up - 10 May 2024

Security news weekly round-up - 10 May 2024

2
Comments 2
2 min read
Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

11
Comments
2 min read
Applying security principles to avoid getting pickpocketed

Applying security principles to avoid getting pickpocketed

Comments
4 min read
How To Manage AWS Security Hub in AWS Organizations Using Terraform

How To Manage AWS Security Hub in AWS Organizations Using Terraform

3
Comments 2
7 min read
Securing the Cloud #28

Securing the Cloud #28

Comments
4 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
How Security Testing Is Becoming an Integral Part of Quality Assurance (QA)

How Security Testing Is Becoming an Integral Part of Quality Assurance (QA)

Comments
3 min read
Managing SSH Keys Across Multiple Devices

Managing SSH Keys Across Multiple Devices

5
Comments 4
3 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

1
Comments 1
2 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Vulnerabilities: Cause for Concern

Vulnerabilities: Cause for Concern

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

9
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

2
Comments
4 min read
How to secure API Gateway using JWT and Lambda Authorizers with Clerk

How to secure API Gateway using JWT and Lambda Authorizers with Clerk

18
Comments
11 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Mantendo seus dados segregados por Padrão

Mantendo seus dados segregados por Padrão

4
Comments 4
6 min read
Fortress GitHub: Building a Secure Organization

Fortress GitHub: Building a Secure Organization

Comments
6 min read
What's New With AWS Security? | April Edition

What's New With AWS Security? | April Edition

2
Comments
4 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
Building for Tomorrow: Part 2 of the Web Application Security Series

Building for Tomorrow: Part 2 of the Web Application Security Series

4
Comments
3 min read
Do You Need an SBOM?

Do You Need an SBOM?

2
Comments
5 min read
Securing the Foundation: Part 1 of the Web Application Security Series

Securing the Foundation: Part 1 of the Web Application Security Series

3
Comments
5 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

6
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

4
Comments
8 min read
Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Comments
2 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

8
Comments
3 min read
How to know if you have the XZ vulnerability and what you can do about it

How to know if you have the XZ vulnerability and what you can do about it

Comments
2 min read
Securely connect to an Amazon RDS

Securely connect to an Amazon RDS

5
Comments
3 min read
Cross Site Scripting (XSS)

Cross Site Scripting (XSS)

Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

2
Comments
2 min read
OWASP Amass

OWASP Amass

2
Comments
2 min read
Securing Docker: Non-Root User Best Practices

Securing Docker: Non-Root User Best Practices

Comments
6 min read
Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

1
Comments
2 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
Simplifying Keycloak Configuration with Terraform and Terragrunt

Simplifying Keycloak Configuration with Terraform and Terragrunt

14
Comments 5
7 min read
What are passkeys and how do they work?

What are passkeys and how do they work?

24
Comments 3
6 min read
How to implement JWT in Laravel API

How to implement JWT in Laravel API

6
Comments
4 min read
API Keys vs Tokens: They're Not the Same Thing!

API Keys vs Tokens: They're Not the Same Thing!

8
Comments
3 min read
10 Common Mistakes in Developing Video Conferencing Apps for Developers

10 Common Mistakes in Developing Video Conferencing Apps for Developers

Comments
9 min read
loading...