DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Sidecar Containers in Kubernetes

Sidecar Containers in Kubernetes

Comments
7 min read
Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Comments
13 min read
AWS Security Group vs NACL: What’s the Difference?

AWS Security Group vs NACL: What’s the Difference?

5
Comments
2 min read
I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

46
Comments 5
7 min read
Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Comments
3 min read
Horizontal privilege escalation

Horizontal privilege escalation

1
Comments
1 min read
Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline

Elevate CI/CD Security: Integrate AI-Powered Vulnerability Detection in Your Pipeline

1
Comments
3 min read
Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails

Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails

2
Comments
6 min read
Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Comments
2 min read
A Quick Look at the Problem of Data Poisoning in Language Models

A Quick Look at the Problem of Data Poisoning in Language Models

1
Comments
2 min read
AWS Session Manager vs SSH

AWS Session Manager vs SSH

1
Comments
5 min read
🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

32
Comments 3
3 min read
Session Management, Tokens & Refresh Tokens

Session Management, Tokens & Refresh Tokens

3
Comments
4 min read
Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Comments
3 min read
Is Your Phone Hacked? Signs and Steps to Take

Is Your Phone Hacked? Signs and Steps to Take

Comments
3 min read
Ansible Vault Cheatsheet: Mastering Secure Configuration Management

Ansible Vault Cheatsheet: Mastering Secure Configuration Management

3
Comments
5 min read
Best Practices for Working with Docker: Networking, Security, and Optimization

Best Practices for Working with Docker: Networking, Security, and Optimization

12
Comments
6 min read
Security news weekly round-up - 25th October 2024

Security news weekly round-up - 25th October 2024

1
Comments
5 min read
Steps to fix package security vulnerabilities in your JS project

Steps to fix package security vulnerabilities in your JS project

3
Comments
3 min read
Docker Security: Best Practices, Configurations, and Real-Life Scenarios

Docker Security: Best Practices, Configurations, and Real-Life Scenarios

Comments
5 min read
Unlocking the Power of Linux Device Drivers

Unlocking the Power of Linux Device Drivers

Comments 1
7 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀

Don't Let Cyber Risks Sink Your Business: A Survival Guide for the Digital Age 🚀

Comments 2
2 min read
I Survived a Massive DDoS Attack and Made My Server Bulletproof

I Survived a Massive DDoS Attack and Made My Server Bulletproof

8
Comments 1
2 min read
How to avoid bricking your device during update rollouts

How to avoid bricking your device during update rollouts

Comments
2 min read
loading...