DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Code Smell 260 - Crowdstrike NULL

Code Smell 260 - Crowdstrike NULL

6
Comments
3 min read
Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

1
Comments
11 min read
6 Tools To Collect Anonymous Team Feedback

6 Tools To Collect Anonymous Team Feedback

Comments
2 min read
Hacking Access to Power Automate

Hacking Access to Power Automate

76
Comments 1
8 min read
The Case for Standards in Mobile App Security

The Case for Standards in Mobile App Security

4
Comments 1
4 min read
Download a Website Certificate

Download a Website Certificate

1
Comments
2 min read
Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

2
Comments
3 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

1
Comments
4 min read
AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

1
Comments
8 min read
Using Amazon Cognito with the user-password flow

Using Amazon Cognito with the user-password flow

4
Comments
8 min read
Using 1Password with External Secrets Operator in a GitOps way

Using 1Password with External Secrets Operator in a GitOps way

14
Comments
7 min read
Issue 55 of AWS Cloud Security Weekly

Issue 55 of AWS Cloud Security Weekly

3
Comments
1 min read
Resourcely founder-led in person or virtual hands-on workshop

Resourcely founder-led in person or virtual hands-on workshop

Comments
1 min read
What's the Difference Between Session-Based Authentication and JWTs?

What's the Difference Between Session-Based Authentication and JWTs?

2
Comments
3 min read
How to decode a JWT

How to decode a JWT

1
Comments
1 min read
How to Deploy Infisical to Manage Application Secrets on Koyeb

How to Deploy Infisical to Manage Application Secrets on Koyeb

Comments
11 min read
Need Help with Nodemailer Access Issues on Outlook and Gmail

Need Help with Nodemailer Access Issues on Outlook and Gmail

Comments
1 min read
CrowdStrike Software Update Leads to Significant Global Tech Outage

CrowdStrike Software Update Leads to Significant Global Tech Outage

Comments
3 min read
Serverless Security - Cognito Misconfigurations

Serverless Security - Cognito Misconfigurations

8
Comments 1
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans

The Data Security Duo: Data Encryption and Vulnerability Scans

1
Comments
5 min read
Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager

Easily Register SSL certificates on AWS with Route 53 and AWS Certificate Manager

3
Comments 2
3 min read
2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

2 Authentication Methods in Web Development: Session-Based vs. Token-Based!

Comments
6 min read
Making SharePoint Online even more secure

Making SharePoint Online even more secure

7
Comments
1 min read
Kubernetes CIS Benchmarking Tool : Day 17 of 50 days DevOps Tools Series

Kubernetes CIS Benchmarking Tool : Day 17 of 50 days DevOps Tools Series

Comments
3 min read
Authentication & Authorization: The Backbone of Secure Systems 🛡

Authentication & Authorization: The Backbone of Secure Systems 🛡

Comments
3 min read
Api Rest .Net completa com JwtToken, integração com api ViaCep utilizando padrão de arquitetura clean architecture

Api Rest .Net completa com JwtToken, integração com api ViaCep utilizando padrão de arquitetura clean architecture

2
Comments
9 min read
Understanding network virtualization and how it helps in day-to-day infrastructure.

Understanding network virtualization and how it helps in day-to-day infrastructure.

Comments
5 min read
Security news weekly round-up - 26th July 2024

Security news weekly round-up - 26th July 2024

Comments
3 min read
AI in Cybersecurity: Improving Data Security Services

AI in Cybersecurity: Improving Data Security Services

1
Comments
4 min read
Automating Kubernetes Security with Kyverno : Day 16 of 50 days DevOps Tools Series

Automating Kubernetes Security with Kyverno : Day 16 of 50 days DevOps Tools Series

2
Comments
3 min read
Why Use Rust?

Why Use Rust?

5
Comments 2
3 min read
Securing your secrets in AWS

Securing your secrets in AWS

33
Comments 2
34 min read
POST only? Let's end this absurd API design debate

POST only? Let's end this absurd API design debate

60
Comments 8
5 min read
Using TruffleHog and pre-commit hook to prevent secret exposure

Using TruffleHog and pre-commit hook to prevent secret exposure

3
Comments
3 min read
Complete Guide To Redeeming TECNO SRC Credits

Complete Guide To Redeeming TECNO SRC Credits

Comments
1 min read
Form Login with Spring Boot and Thymeleaf

Form Login with Spring Boot and Thymeleaf

2
Comments
7 min read
Securing the AWS Infrastructure

Securing the AWS Infrastructure

2
Comments
4 min read
Lanjutan Lapisan OSI

Lanjutan Lapisan OSI

1
Comments
3 min read
How to Hire an Android Developer for Your Project in 2024

How to Hire an Android Developer for Your Project in 2024

Comments 1
5 min read
A hands-on lab: Why running as root in Kubernetes containers is dangerous?

A hands-on lab: Why running as root in Kubernetes containers is dangerous?

1
Comments 2
5 min read
Linux commands to analyze DDoS attacks

Linux commands to analyze DDoS attacks

1
Comments
3 min read
Comandos Linux para analisar ataques DDoS

Comandos Linux para analisar ataques DDoS

Comments
3 min read
A Guide to JWTs: Signing with RS256 Made Simple.

A Guide to JWTs: Signing with RS256 Made Simple.

5
Comments 1
3 min read
Day 18: Centralized ELK Stack Setup

Day 18: Centralized ELK Stack Setup

2
Comments 1
2 min read
Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

Protecting Sensitive Data: Mastering String Encryption in Java 🔐👨‍💻

6
Comments
3 min read
Security-charging Your NextJS 14 App with Userfront Authentication

Security-charging Your NextJS 14 App with Userfront Authentication

1
Comments
8 min read
Unity Catalog for IRIS Workloads - Collision Theory Confirmed

Unity Catalog for IRIS Workloads - Collision Theory Confirmed

2
Comments
5 min read
What’s the difference between RBAC and ABAC in Fauna?

What’s the difference between RBAC and ABAC in Fauna?

Comments
2 min read
Fighting The Bad Guys in a Fun Way

Fighting The Bad Guys in a Fun Way

1
Comments 2
4 min read
Practical Steps to Enhance Your Security Today

Practical Steps to Enhance Your Security Today

1
Comments
2 min read
Stop Leaking Env Secrets: Your Password Manager Holds the Key

Stop Leaking Env Secrets: Your Password Manager Holds the Key

1
Comments
7 min read
Introduction to Vault

Introduction to Vault

1
Comments
2 min read
Top 5 Security Practices for Web Developers

Top 5 Security Practices for Web Developers

Comments
2 min read
3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

3 high-profile and controversial cyber scandals involving a dating site for married people, Elon Musk, and Apple

6
Comments
3 min read
How to make “Input validation” easy for your devs

How to make “Input validation” easy for your devs

1
Comments
5 min read
Caption this image! (Azure & CrowdStrike outages)

Caption this image! (Azure & CrowdStrike outages)

11
Comments 3
1 min read
Issue 54 of AWS Cloud Security Weekly

Issue 54 of AWS Cloud Security Weekly

3
Comments
2 min read
Level up your env var tooling in Next.js with DMNO

Level up your env var tooling in Next.js with DMNO

5
Comments
5 min read
Preventing Spammers in Laravel: Using rahulalam31/laravel-abuse-ip Package

Preventing Spammers in Laravel: Using rahulalam31/laravel-abuse-ip Package

1
Comments
2 min read
loading...