DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

2
Comments
10 min read
Secure GraphQL Microservices

Secure GraphQL Microservices

3
Comments
5 min read
Broken Access Control: What Is It and Why Does It Matter in your Rails application?

Broken Access Control: What Is It and Why Does It Matter in your Rails application?

5
Comments
8 min read
Rails Security Best Practices: Protecting Your Applications from Common Threats - Index

Rails Security Best Practices: Protecting Your Applications from Common Threats - Index

2
Comments
1 min read
Tailscale vs ZeroTier

Tailscale vs ZeroTier

24
Comments 2
5 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

30
Comments 2
12 min read
How TLS / mTLS handshakes Work?

How TLS / mTLS handshakes Work?

5
Comments
2 min read
How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

7
Comments 2
3 min read
Amazon CodeGuru Reviewer: already time for retirement?

Amazon CodeGuru Reviewer: already time for retirement?

Comments
7 min read
Migrating users without downtime in your service (The Lazy Migration Strategy)

Migrating users without downtime in your service (The Lazy Migration Strategy)

1
Comments
5 min read
Vulnerability Scanning

Vulnerability Scanning

1
Comments
2 min read
How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

Comments
9 min read
Hack The Box Writeup: Emdee Five for Life

Hack The Box Writeup: Emdee Five for Life

Comments
6 min read
Play Microservices: Security

Play Microservices: Security

6
Comments
10 min read
awesome MLSecOps: aka prompt injection is the new SQL injection

awesome MLSecOps: aka prompt injection is the new SQL injection

3
Comments 2
2 min read
Enhancing AWS Lambda Security with Deno

Enhancing AWS Lambda Security with Deno

1
Comments 3
4 min read
Understanding Authentication & Authorization in Istio

Understanding Authentication & Authorization in Istio

Comments
11 min read
Rational Shift-Left Security for Developers

Rational Shift-Left Security for Developers

2
Comments 1
7 min read
TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

4
Comments 1
4 min read
Programmatically retrieving secrets from Parameter Store and Secrets Manager

Programmatically retrieving secrets from Parameter Store and Secrets Manager

11
Comments
6 min read
True Secrets Auto Rotation with ESO and Vault

True Secrets Auto Rotation with ESO and Vault

13
Comments
7 min read
The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

2
Comments
2 min read
Flexible Policy Composition - Local & Export Variables in Cerbos Policies

Flexible Policy Composition - Local & Export Variables in Cerbos Policies

1
Comments
3 min read
Setting up SSL Certificate with Nginx

Setting up SSL Certificate with Nginx

2
Comments
2 min read
How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

Comments
4 min read
Advanced Secure Node.js Auth with JWT

Advanced Secure Node.js Auth with JWT

20
Comments 1
5 min read
Introduction: Safeguarding Your Spaces in an Interconnected World

Introduction: Safeguarding Your Spaces in an Interconnected World

1
Comments 1
3 min read
Top 5 Featured DEV Tag(#security) Posts from the Past Week

Top 5 Featured DEV Tag(#security) Posts from the Past Week

3
Comments 3
1 min read
JWT desmistificado

JWT desmistificado

2
Comments
3 min read
Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

4
Comments
3 min read
Overview of AWS Security Group

Overview of AWS Security Group

13
Comments
3 min read
Guide to pentesting (what, why, and how)

Guide to pentesting (what, why, and how)

1
Comments
3 min read
Top 10 Best Web Application Security Best Practices for Developers to Follow

Top 10 Best Web Application Security Best Practices for Developers to Follow

7
Comments
6 min read
Security Advisory for Tauri 1.4 (CVE-2023-34460)

Security Advisory for Tauri 1.4 (CVE-2023-34460)

6
Comments
3 min read
Configure SSH Keys for Your GitHub Account

Configure SSH Keys for Your GitHub Account

2
Comments
3 min read
BoxyHQ + Cerbos: Merging SSO and Authorization

BoxyHQ + Cerbos: Merging SSO and Authorization

1
Comments
10 min read
Cracking Firefox Encryption and Rescuing Saved Passwords!

Cracking Firefox Encryption and Rescuing Saved Passwords!

3
Comments 1
3 min read
Django - reCaptcha

Django - reCaptcha

1
Comments
4 min read
The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

Comments
2 min read
Understanding Container Security

Understanding Container Security

6
Comments
5 min read
Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Comments
3 min read
Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

11
Comments 2
5 min read
Security🔐 Concerns with Cookies🍪.

Security🔐 Concerns with Cookies🍪.

24
Comments 8
4 min read
Build your own Remote Access VPN to AWS with WireGuard and Netmaker

Build your own Remote Access VPN to AWS with WireGuard and Netmaker

42
Comments 2
4 min read
How to use JWT authentication with Iris

How to use JWT authentication with Iris

Comments
8 min read
Securely downloading encrypted S3 objects using CloudFront

Securely downloading encrypted S3 objects using CloudFront

5
Comments
5 min read
RLS of Supabase(PostgreSQL) Is Good, But …🤔

RLS of Supabase(PostgreSQL) Is Good, But …🤔

51
Comments 4
6 min read
Unlocking the Secrets of GDPR Compliance in IT Outsourcing

Unlocking the Secrets of GDPR Compliance in IT Outsourcing

15
Comments
10 min read
Best Practices for Audit Logs in Cloud Applications

Best Practices for Audit Logs in Cloud Applications

8
Comments 1
8 min read
Deploying Code Safely: Protecting Sensitive Data in Your Projects

Deploying Code Safely: Protecting Sensitive Data in Your Projects

3
Comments
1 min read
Verifiable Random Functions (VRF) with Ruby

Verifiable Random Functions (VRF) with Ruby

11
Comments
5 min read
Server-Side Request Forgery in Rails

Server-Side Request Forgery in Rails

Comments
5 min read
Drawbacks of IP whitelist

Drawbacks of IP whitelist

7
Comments 1
2 min read
Netmaker - WireGuard Made Easy

Netmaker - WireGuard Made Easy

47
Comments 1
2 min read
The evolution of password hashing

The evolution of password hashing

5
Comments
8 min read
Workload Identity GKE - Service account k8s com permissões na GCP

Workload Identity GKE - Service account k8s com permissões na GCP

Comments
3 min read
It depends! Exploring my favourite Renovate features for dependency updates

It depends! Exploring my favourite Renovate features for dependency updates

1
Comments
6 min read
How to Hide Your Network in the AWS Cloud Using NAT Gateway

How to Hide Your Network in the AWS Cloud Using NAT Gateway

15
Comments
3 min read
Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

21
Comments 2
8 min read
Como evitar ataques de injeção de código em aplicações Node.js

Como evitar ataques de injeção de código em aplicações Node.js

Comments
4 min read
loading...