DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Creating Cross-Account DynamoDB Backups with Terraform

Creating Cross-Account DynamoDB Backups with Terraform

1
Comments
4 min read
DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

1
Comments
1 min read
Issue 52 of AWS Cloud Security Weekly

Issue 52 of AWS Cloud Security Weekly

4
Comments
1 min read
Cloud Native Live: Automate pinning GitHub Actions and container images to their digests

Cloud Native Live: Automate pinning GitHub Actions and container images to their digests

3
Comments
1 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

3
Comments
7 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

1
Comments
2 min read
Build vs. Buy: How to approach SSO for your SaaS app

Build vs. Buy: How to approach SSO for your SaaS app

1
Comments
4 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Understanding self-assumption and scoped-down policy in AWS IAM

Understanding self-assumption and scoped-down policy in AWS IAM

7
Comments 1
3 min read
Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Comments
2 min read
AWS: Kubernetes and Access Management API, the new authentication in EKS

AWS: Kubernetes and Access Management API, the new authentication in EKS

1
Comments 1
11 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Recreating Stripe’s Roles in PropelAuth

Recreating Stripe’s Roles in PropelAuth

Comments
5 min read
How to Protect Your Application from AI Bots

How to Protect Your Application from AI Bots

4
Comments
10 min read
Internet security through lava lamps

Internet security through lava lamps

Comments
3 min read
AI and Data Privacy: Balancing Innovation and Security in the Digital Age

AI and Data Privacy: Balancing Innovation and Security in the Digital Age

1
Comments
11 min read
WebCheck: Find out what hackers know about your site

WebCheck: Find out what hackers know about your site

1
Comments
1 min read
AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

AWS: RDS IAM database authentication, EKS Pod Identities, and Terraform

Comments
12 min read
OAuth em aplicações SPA / Mobile (PKCE extension)

OAuth em aplicações SPA / Mobile (PKCE extension)

1
Comments
4 min read
Understanding self-assumption and scoped down policy of an AWS IAM role

Understanding self-assumption and scoped down policy of an AWS IAM role

4
Comments
2 min read
API Security Fundamentals: Key Practices for Developers

API Security Fundamentals: Key Practices for Developers

3
Comments 1
13 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
AWS Cognito - IAM in the Cloud

AWS Cognito - IAM in the Cloud

1
Comments
3 min read
Beyond JWT: Unlocking PASETO for Secure Token Management

Beyond JWT: Unlocking PASETO for Secure Token Management

3
Comments
7 min read
Execute JavaScript in a WebAssembly QuickJS Sandbox

Execute JavaScript in a WebAssembly QuickJS Sandbox

6
Comments
4 min read
JavaScript app security audit

JavaScript app security audit

1
Comments
2 min read
Top Search Engines for Pentesters

Top Search Engines for Pentesters

Comments
1 min read
Securing Your APIs: A Guide to Design Patterns for Robust Defense

Securing Your APIs: A Guide to Design Patterns for Robust Defense

Comments
3 min read
5 Auth0 Gotchas to Consider

5 Auth0 Gotchas to Consider

Comments
3 min read
SSH Config for Multiple SSH Authentication

SSH Config for Multiple SSH Authentication

15
Comments
1 min read
Security news weekly round-up - 5th July 2024

Security news weekly round-up - 5th July 2024

Comments
3 min read
Implementing Secure Authentication in Next.js with JWT and MongoDB. Protect Routes using middleware

Implementing Secure Authentication in Next.js with JWT and MongoDB. Protect Routes using middleware

1
Comments
3 min read
Data Consistency and Integrity in API Integration

Data Consistency and Integrity in API Integration

3
Comments
5 min read
Securing Generative AI Applications: A Comprehensive Approach

Securing Generative AI Applications: A Comprehensive Approach

Comments
4 min read
Secure Access to Connected Devices

Secure Access to Connected Devices

Comments
2 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

3
Comments
2 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
Protecting Sensitive Data using Ansible Vault

Protecting Sensitive Data using Ansible Vault

2
Comments
4 min read
Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
What Technologies Help Prevent Cyber Attacks? 🛡️💻

What Technologies Help Prevent Cyber Attacks? 🛡️💻

2
Comments
1 min read
𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

1
Comments
1 min read
Level Up Your GitHub Repo Config Game

Level Up Your GitHub Repo Config Game

3
Comments
1 min read
How to Apply a Magento 2 Patch

How to Apply a Magento 2 Patch

5
Comments 2
2 min read
JWT for Developers: Behind the Scenes.

JWT for Developers: Behind the Scenes.

4
Comments 1
4 min read
SSRF Vulnerability in HiTranslate: A Technical Breakdown

SSRF Vulnerability in HiTranslate: A Technical Breakdown

Comments
2 min read
Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
How to Design Secure and Safe APIs: 12 Essential Tips for API Security

How to Design Secure and Safe APIs: 12 Essential Tips for API Security

2
Comments
3 min read
Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

6
Comments
1 min read
Gone in 120 seconds

Gone in 120 seconds

1
Comments
5 min read
How to Implement Two-Factor Authentication (2FA) in Golang

How to Implement Two-Factor Authentication (2FA) in Golang

16
Comments
16 min read
Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
Intro to Application Security

Intro to Application Security

23
Comments 6
3 min read
Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

3
Comments 1
1 min read
AWS All Builders Welcome Grant & re:Inforce Newbie

AWS All Builders Welcome Grant & re:Inforce Newbie

4
Comments 1
4 min read
Cybersecurity 101 for Developers: From Zero to Hero

Cybersecurity 101 for Developers: From Zero to Hero

4
Comments
4 min read
Security in Requirements phase

Security in Requirements phase

5
Comments 2
8 min read
I'm Under DDoS Attack

I'm Under DDoS Attack

8
Comments
6 min read
When has rolling your own auth gone wrong?

When has rolling your own auth gone wrong?

Comments 1
2 min read
Understanding Security Context in Kubernetes

Understanding Security Context in Kubernetes

6
Comments 1
2 min read
loading...