DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
JWT Explained

JWT Explained

68
Comments 15
3 min read
Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Comments
5 min read
AppArmor testsuite

AppArmor testsuite

1
Comments
1 min read
Security news weekly round-up - 10 May 2024

Security news weekly round-up - 10 May 2024

2
Comments 2
2 min read
Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

11
Comments
2 min read
Applying security principles to avoid getting pickpocketed

Applying security principles to avoid getting pickpocketed

Comments
4 min read
How To Manage AWS Security Hub in AWS Organizations Using Terraform

How To Manage AWS Security Hub in AWS Organizations Using Terraform

3
Comments 2
7 min read
Securing the Cloud #28

Securing the Cloud #28

Comments
4 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
How Security Testing Is Becoming an Integral Part of Quality Assurance (QA)

How Security Testing Is Becoming an Integral Part of Quality Assurance (QA)

Comments
3 min read
Managing SSH Keys Across Multiple Devices

Managing SSH Keys Across Multiple Devices

5
Comments 4
3 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

1
Comments 1
2 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Vulnerabilities: Cause for Concern

Vulnerabilities: Cause for Concern

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

9
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

2
Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

1
Comments
1 min read
How to secure API Gateway using JWT and Lambda Authorizers with Clerk

How to secure API Gateway using JWT and Lambda Authorizers with Clerk

18
Comments
11 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Mantendo seus dados segregados por PadrĂŁo

Mantendo seus dados segregados por PadrĂŁo

4
Comments 4
6 min read
Fortress GitHub: Building a Secure Organization

Fortress GitHub: Building a Secure Organization

Comments
6 min read
What's New With AWS Security? | April Edition

What's New With AWS Security? | April Edition

2
Comments
4 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
Building for Tomorrow: Part 2 of the Web Application Security Series

Building for Tomorrow: Part 2 of the Web Application Security Series

4
Comments
3 min read
Do You Need an SBOM?

Do You Need an SBOM?

2
Comments
5 min read
Securing the Foundation: Part 1 of the Web Application Security Series

Securing the Foundation: Part 1 of the Web Application Security Series

3
Comments
5 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

6
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

4
Comments
8 min read
Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Comments
2 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

8
Comments
3 min read
How to know if you have the XZ vulnerability and what you can do about it

How to know if you have the XZ vulnerability and what you can do about it

Comments
2 min read
Securely connect to an Amazon RDS

Securely connect to an Amazon RDS

5
Comments
3 min read
Cross Site Scripting (XSS)

Cross Site Scripting (XSS)

Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

2
Comments
2 min read
OWASP Amass

OWASP Amass

3
Comments
2 min read
Securing Docker: Non-Root User Best Practices

Securing Docker: Non-Root User Best Practices

Comments
6 min read
Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

Managing Secrets Security at any Scale: introducing the GitGuardian Secrets Management Needs Quiz

1
Comments
2 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
What are passkeys and how do they work?

What are passkeys and how do they work?

24
Comments 3
6 min read
Simplifying Keycloak Configuration with Terraform and Terragrunt

Simplifying Keycloak Configuration with Terraform and Terragrunt

14
Comments 5
7 min read
How to implement JWT in Laravel API

How to implement JWT in Laravel API

6
Comments
4 min read
API Keys vs Tokens: They're Not the Same Thing!

API Keys vs Tokens: They're Not the Same Thing!

8
Comments
3 min read
10 Common Mistakes in Developing Video Conferencing Apps for Developers

10 Common Mistakes in Developing Video Conferencing Apps for Developers

Comments
9 min read
Encrypting with Block Ciphers: A Guide to AES, CBC, and More

Encrypting with Block Ciphers: A Guide to AES, CBC, and More

8
Comments
6 min read
Security news weekly round-up - 3rd May 2024

Security news weekly round-up - 3rd May 2024

1
Comments
3 min read
GitHub: Personal Access Tokens

GitHub: Personal Access Tokens

Comments
5 min read
Why IMDSv1 is a Security Risk for Cloud Infrastructure

Why IMDSv1 is a Security Risk for Cloud Infrastructure

2
Comments
4 min read
Brute Force Attacks and CAPTCHA

Brute Force Attacks and CAPTCHA

37
Comments 1
2 min read
How legacy VB6 systems are endangering healthcare providers

How legacy VB6 systems are endangering healthcare providers

11
Comments
4 min read
AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

1
Comments
8 min read
Why Understanding Your Open Source Licenses Matters

Why Understanding Your Open Source Licenses Matters

7
Comments
6 min read
Securing Your Cloud: Proactive Strategies for AWS Security

Securing Your Cloud: Proactive Strategies for AWS Security

8
Comments
5 min read
NodeJS Best Practices: Redacting Secrets from Your Pino Logs

NodeJS Best Practices: Redacting Secrets from Your Pino Logs

5
Comments
3 min read
Protect your emails (Short note)

Protect your emails (Short note)

12
Comments 5
4 min read
loading...