DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enhancing Your Cloud Security Services for Optimal Protection

Enhancing Your Cloud Security Services for Optimal Protection

1
Comments
3 min read
How to Store User Passwords Securely

How to Store User Passwords Securely

3
Comments 1
4 min read
ShellCode 1.0

ShellCode 1.0

1
Comments
3 min read
What we can learn from the faulty CrowdStrike update

What we can learn from the faulty CrowdStrike update

1
Comments
2 min read
Creating users in Amazon Cognito programmatically

Creating users in Amazon Cognito programmatically

Comments
3 min read
Building JWT Auth Chaining with FastAPI and Python

Building JWT Auth Chaining with FastAPI and Python

2
Comments 1
4 min read
CrowdStrike Blew Up the Internet

CrowdStrike Blew Up the Internet

Comments
2 min read
AWS Security Essentials: From Prevention to Detection

AWS Security Essentials: From Prevention to Detection

1
Comments
4 min read
How to stop form spam without using ReCaptcha?

How to stop form spam without using ReCaptcha?

6
Comments 11
2 min read
Security news weekly round-up - 19th July 2024

Security news weekly round-up - 19th July 2024

1
Comments
3 min read
Secure and Resilient Design

Secure and Resilient Design

2
Comments
16 min read
Enhancing OIDC security with demonstrating proof of possession (DPoP)

Enhancing OIDC security with demonstrating proof of possession (DPoP)

15
Comments
3 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

Comments
6 min read
Scenario based practices for securing an AWS S3 bucket.

Scenario based practices for securing an AWS S3 bucket.

7
Comments
2 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

1
Comments
2 min read
Why we built Resourcely

Why we built Resourcely

2
Comments
6 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

5
Comments
3 min read
Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

5
Comments
4 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

4
Comments
3 min read
Configuring Routes for a Web Application using Azure Firewall (Part 4)

Configuring Routes for a Web Application using Azure Firewall (Part 4)

Comments
2 min read
SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Issue 53 of AWS Cloud Security Weekly

Issue 53 of AWS Cloud Security Weekly

5
Comments
1 min read
Simple OAuth 2.0 Framework for Authentication (Freeware)

Simple OAuth 2.0 Framework for Authentication (Freeware)

Comments
1 min read
Security Meetup

Security Meetup

Comments
1 min read
Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

4
Comments
8 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

7
Comments
2 min read
6 Top Courses to Master Software Architecture

6 Top Courses to Master Software Architecture

7
Comments 1
5 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
2 min read
Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
3 min read
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

14
Comments
6 min read
Securing Firebase Connections in Next.js with HTTPS

Securing Firebase Connections in Next.js with HTTPS

Comments
2 min read
Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

13
Comments 1
10 min read
Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

9
Comments 1
6 min read
Top 10 Application Security Vulnerabilities in 2024

Top 10 Application Security Vulnerabilities in 2024

21
Comments
6 min read
𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚

𝐓𝐡𝐞 𝐏𝐬𝐲𝐜𝐡𝐨𝐥𝐨𝐠𝐲 𝐨𝐟 𝐒𝐨𝐜𝐢𝐚𝐥 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠: 𝐇𝐨𝐰 𝐭𝐨 𝐏𝐫𝐨𝐭𝐞𝐜𝐭 𝐘𝐨𝐮𝐫𝐬𝐞𝐥𝐟 𝐚𝐧𝐝 𝐘𝐨𝐮𝐫 𝐃𝐚𝐭𝐚

5
Comments 7
1 min read
Tokenization vs encryption

Tokenization vs encryption

1
Comments
4 min read
Securing Data at Rest: The Importance of Encryption and How to Implement It

Securing Data at Rest: The Importance of Encryption and How to Implement It

Comments
3 min read
Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Comments
2 min read
Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

4
Comments
4 min read
Code Smell 258 - Secrets in Code

Code Smell 258 - Secrets in Code

4
Comments
2 min read
The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

1
Comments
6 min read
Security in LLMs: Safeguarding AI Systems - V

Security in LLMs: Safeguarding AI Systems - V

2
Comments
7 min read
Webhooks vs. polling

Webhooks vs. polling

77
Comments 7
3 min read
Como um Malware opera, quais são os seus tipos e como se proteger.

Como um Malware opera, quais são os seus tipos e como se proteger.

3
Comments
5 min read
Gitleaks: Find forgotten codes in your repositories

Gitleaks: Find forgotten codes in your repositories

Comments
1 min read
Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Comments
5 min read
SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

Comments
2 min read
Usando PAM no Linux

Usando PAM no Linux

5
Comments
4 min read
Security news weekly round-up - 12th July 2024

Security news weekly round-up - 12th July 2024

Comments
4 min read
Mitigating XSS Risks: Best Practices for Web Applications

Mitigating XSS Risks: Best Practices for Web Applications

7
Comments
4 min read
Enhancing PostgreSQL Security with the Credcheck Extension

Enhancing PostgreSQL Security with the Credcheck Extension

3
Comments
1 min read
How AI and Machine Learning Are Revolutionizing IT Services

How AI and Machine Learning Are Revolutionizing IT Services

Comments
2 min read
DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

11
Comments 1
1 min read
New Securi-Taco Tuesdays Livestream (Monthly)

New Securi-Taco Tuesdays Livestream (Monthly)

2
Comments
2 min read
Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

2
Comments
2 min read
Foremost ที่ไม่ใช่ นม

Foremost ที่ไม่ใช่ นม

1
Comments
1 min read
Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

1
Comments 1
7 min read
VaultWarden: Your local password manager

VaultWarden: Your local password manager

3
Comments
5 min read
loading...