DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Create digital certificate

Create digital certificate

4
Comments
3 min read
How I unsuccessfully tried to recover my lost password

How I unsuccessfully tried to recover my lost password

7
Comments 2
12 min read
KubeClarity in Action - Image Scanning as part of your CI workflow

KubeClarity in Action - Image Scanning as part of your CI workflow

2
Comments
6 min read
Yes! OpenTelemetry is a Critical Part of Securing Your Systems

Yes! OpenTelemetry is a Critical Part of Securing Your Systems

3
Comments
7 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

Comments
3 min read
Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

1
Comments
5 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

1
Comments
3 min read
Increase AWS Security Posture with IAM Roles and Policies

Increase AWS Security Posture with IAM Roles and Policies

8
Comments 1
8 min read
Understanding AWS WAF Pricing

Understanding AWS WAF Pricing

6
Comments 2
6 min read
Avoiding Common Mistakes in Cloud Architecture Design Interviews

Avoiding Common Mistakes in Cloud Architecture Design Interviews

7
Comments 2
3 min read
Use Tetragon to Limit Network Usage for a set of Binary

Use Tetragon to Limit Network Usage for a set of Binary

6
Comments 1
6 min read
Lenient scope search in Cerbos policies

Lenient scope search in Cerbos policies

3
Comments
3 min read
Returning customized content based on location with S3 Object Lambda

Returning customized content based on location with S3 Object Lambda

4
Comments
9 min read
Should You Roll Your Own RBAC Authorization?

Should You Roll Your Own RBAC Authorization?

8
Comments 3
6 min read
Improve your app by using validations

Improve your app by using validations

Comments
1 min read
Mejora tu aplicación usando validaciones

Mejora tu aplicación usando validaciones

Comments
1 min read
Secure Your JavaScript Project with 'npm audit'!

Secure Your JavaScript Project with 'npm audit'!

7
Comments 1
2 min read
A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

Comments
8 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

2
Comments
10 min read
Secure GraphQL Microservices

Secure GraphQL Microservices

3
Comments
5 min read
Broken Access Control: What Is It and Why Does It Matter in your Rails application?

Broken Access Control: What Is It and Why Does It Matter in your Rails application?

5
Comments
8 min read
Rails Security Best Practices: Protecting Your Applications from Common Threats - Index

Rails Security Best Practices: Protecting Your Applications from Common Threats - Index

2
Comments
1 min read
Tailscale vs ZeroTier

Tailscale vs ZeroTier

25
Comments 2
5 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

30
Comments 2
12 min read
How TLS / mTLS handshakes Work?

How TLS / mTLS handshakes Work?

5
Comments
2 min read
How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

7
Comments 2
3 min read
Amazon CodeGuru Reviewer: already time for retirement?

Amazon CodeGuru Reviewer: already time for retirement?

Comments
7 min read
Migrating users without downtime in your service (The Lazy Migration Strategy)

Migrating users without downtime in your service (The Lazy Migration Strategy)

1
Comments
5 min read
Vulnerability Scanning

Vulnerability Scanning

1
Comments
2 min read
How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

How to Secure Your CI/CD Pipelines with GitGuardian Honeytokens

Comments
9 min read
Hack The Box Writeup: Emdee Five for Life

Hack The Box Writeup: Emdee Five for Life

Comments
6 min read
Play Microservices: Security

Play Microservices: Security

6
Comments
10 min read
awesome MLSecOps: aka prompt injection is the new SQL injection

awesome MLSecOps: aka prompt injection is the new SQL injection

3
Comments 2
2 min read
Enhancing AWS Lambda Security with Deno

Enhancing AWS Lambda Security with Deno

1
Comments 3
4 min read
Understanding Authentication & Authorization in Istio

Understanding Authentication & Authorization in Istio

Comments
11 min read
Rational Shift-Left Security for Developers

Rational Shift-Left Security for Developers

2
Comments 1
7 min read
TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

4
Comments 1
4 min read
Programmatically retrieving secrets from Parameter Store and Secrets Manager

Programmatically retrieving secrets from Parameter Store and Secrets Manager

11
Comments
6 min read
True Secrets Auto Rotation with ESO and Vault

True Secrets Auto Rotation with ESO and Vault

13
Comments
7 min read
The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

2
Comments
2 min read
Setting up SSL Certificate with Nginx

Setting up SSL Certificate with Nginx

2
Comments
2 min read
Flexible Policy Composition - Local & Export Variables in Cerbos Policies

Flexible Policy Composition - Local & Export Variables in Cerbos Policies

1
Comments
3 min read
How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

Comments
4 min read
Advanced Secure Node.js Auth with JWT

Advanced Secure Node.js Auth with JWT

20
Comments 1
5 min read
Introduction: Safeguarding Your Spaces in an Interconnected World

Introduction: Safeguarding Your Spaces in an Interconnected World

1
Comments 1
3 min read
Top 5 Featured DEV Tag(#security) Posts from the Past Week

Top 5 Featured DEV Tag(#security) Posts from the Past Week

3
Comments 3
1 min read
JWT desmistificado

JWT desmistificado

2
Comments
3 min read
Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

4
Comments
3 min read
Overview of AWS Security Group

Overview of AWS Security Group

13
Comments
3 min read
Guide to pentesting (what, why, and how)

Guide to pentesting (what, why, and how)

1
Comments
3 min read
Top 10 Best Web Application Security Best Practices for Developers to Follow

Top 10 Best Web Application Security Best Practices for Developers to Follow

7
Comments
6 min read
Security Advisory for Tauri 1.4 (CVE-2023-34460)

Security Advisory for Tauri 1.4 (CVE-2023-34460)

6
Comments
3 min read
Configure SSH Keys for Your GitHub Account

Configure SSH Keys for Your GitHub Account

2
Comments
3 min read
BoxyHQ + Cerbos: Merging SSO and Authorization

BoxyHQ + Cerbos: Merging SSO and Authorization

1
Comments
10 min read
Cracking Firefox Encryption and Rescuing Saved Passwords!

Cracking Firefox Encryption and Rescuing Saved Passwords!

4
Comments 1
3 min read
Django - reCaptcha

Django - reCaptcha

2
Comments
4 min read
The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

Comments
2 min read
Understanding Container Security

Understanding Container Security

6
Comments
5 min read
Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Comments
3 min read
Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

11
Comments 2
5 min read
loading...