DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Gaps in SOC Operator and Analyst Skillsets

Gaps in SOC Operator and Analyst Skillsets

Comments
3 min read
Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

4
Comments
6 min read
Prompt Fuzzer: how to keep your agents on the right path

Prompt Fuzzer: how to keep your agents on the right path

1
Comments
2 min read
Building a Fort: Django Security Best Practices

Building a Fort: Django Security Best Practices

4
Comments
7 min read
HTTP / HTTPS Communication Protocol

HTTP / HTTPS Communication Protocol

5
Comments 2
8 min read
Services that can integrate with AWS Certificate Manager and their Use Case

Services that can integrate with AWS Certificate Manager and their Use Case

2
Comments 2
3 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
AWS Detective

AWS Detective

Comments
2 min read
Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

1
Comments
4 min read
Introducing the Ultimate Password Generator: Your Key to Online Security

Introducing the Ultimate Password Generator: Your Key to Online Security

Comments
2 min read
How to Hide the X-Powered-By Header in NestJS

How to Hide the X-Powered-By Header in NestJS

8
Comments 2
1 min read
Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

2
Comments
3 min read
De4py: Advanced python reverse engineering

De4py: Advanced python reverse engineering

4
Comments
2 min read
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
Issue 43 of AWS Cloud Security Weekly

Issue 43 of AWS Cloud Security Weekly

4
Comments
2 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

1
Comments
6 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Securing the Cloud #29

Securing the Cloud #29

5
Comments
3 min read
Password Management: Passwordless Login

Password Management: Passwordless Login

10
Comments 2
8 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

5
Comments
3 min read
The Benefits of Opting Out from Using OfficialUSA.com

The Benefits of Opting Out from Using OfficialUSA.com

1
Comments 1
4 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

15
Comments
9 min read
Are Your Secrets Projects Truly Safe?🔐

Are Your Secrets Projects Truly Safe?🔐

Comments 2
2 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Client assertion in OAuth 2.0 client authentication

Client assertion in OAuth 2.0 client authentication

12
Comments
4 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Threat Modeling for Developers

Threat Modeling for Developers

24
Comments 2
3 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Frontend Web Security - Protecting Against Common Threats

Frontend Web Security - Protecting Against Common Threats

Comments
2 min read
Comparing token-based authentication and session-based authentication

Comparing token-based authentication and session-based authentication

19
Comments 2
4 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

10
Comments
1 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

35
Comments
2 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Syncing AWS Secrets Manager across accounts

Syncing AWS Secrets Manager across accounts

7
Comments
2 min read
Detect AES in ECB mode

Detect AES in ECB mode

1
Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

3
Comments
8 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

5
Comments
6 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

9
Comments
7 min read
O que ĂŠ SOAR?

O que ĂŠ SOAR?

6
Comments
4 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
Safeguarding Avalonia Apps with ByteHide Shield 🛡️

Safeguarding Avalonia Apps with ByteHide Shield 🛡️

2
Comments
2 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

6
Comments
2 min read
Database Encryption: Secure Your Data with Best Practices

Database Encryption: Secure Your Data with Best Practices

1
Comments
1 min read
Locally test and validate your Renovate configuration files

Locally test and validate your Renovate configuration files

Comments
3 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

5
Comments 2
2 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

4
Comments
13 min read
loading...