DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protect API Gateway with Amazon Verified Permissions

Protect API Gateway with Amazon Verified Permissions

3
Comments 2
8 min read
Data Privacy in API Integrations

Data Privacy in API Integrations

3
Comments
5 min read
Beyond the login screen

Beyond the login screen

1
Comments
5 min read
Authentication using JSON Web Tokens.

Authentication using JSON Web Tokens.

8
Comments
4 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
Enhancing AWS Monitoring for Improved Threat Management

Enhancing AWS Monitoring for Improved Threat Management

Comments
2 min read
🔐Simple Yet Crucial step to avoid security incidents💡

🔐Simple Yet Crucial step to avoid security incidents💡

5
Comments
1 min read
Securing Your Web Application with AWS WAF and AWS Shield

Securing Your Web Application with AWS WAF and AWS Shield

Comments
5 min read
Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

6
Comments
6 min read
Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments 2
3 min read
How To Implement AWS SSB Controls in Terraform - Part 4

How To Implement AWS SSB Controls in Terraform - Part 4

2
Comments
11 min read
Identity and Access Management (IAM)

Identity and Access Management (IAM)

Comments
2 min read
Exploring FAPI 2.0: The Latest in API Security Technology

Exploring FAPI 2.0: The Latest in API Security Technology

1
Comments
32 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
The ROI of paying open source maintainers (in light of the xz utils backdoor)

The ROI of paying open source maintainers (in light of the xz utils backdoor)

1
Comments 1
7 min read
Azure Managed Identities: No more secrets

Azure Managed Identities: No more secrets

1
Comments
4 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Enhancing API Security: Best Practices for Developers

Enhancing API Security: Best Practices for Developers

4
Comments 2
2 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
Gerenciando informações e eventos de segurança - SIEM

Gerenciando informações e eventos de segurança - SIEM

3
Comments
3 min read
Analyzing Software Supply Chain Security with Graph Analytics

Analyzing Software Supply Chain Security with Graph Analytics

Comments
1 min read
"Keep everything online"

"Keep everything online"

Comments
3 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

2
Comments
3 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
12 Free Courses To Help You Develop More Secure Software - Shift Security Left

12 Free Courses To Help You Develop More Secure Software - Shift Security Left

9
Comments
6 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
PrivatePing - A Secure Messaging Application

PrivatePing - A Secure Messaging Application

5
Comments
2 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

2
Comments
5 min read
How to generate a secure and robust SSH key in 2024

How to generate a secure and robust SSH key in 2024

51
Comments 2
2 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
How to secure an existing SSH key with a passphrase

How to secure an existing SSH key with a passphrase

7
Comments
2 min read
Why using a passphrase to secure your SSH key ?

Why using a passphrase to secure your SSH key ?

8
Comments
2 min read
Integer overflow vulnerabilities in .NET

Integer overflow vulnerabilities in .NET

1
Comments
3 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
Securing the Cloud #25

Securing the Cloud #25

Comments
4 min read
Security news weekly round-up - 5th April 2024

Security news weekly round-up - 5th April 2024

1
Comments
3 min read
Infrastructure protection on AWS for Beginners

Infrastructure protection on AWS for Beginners

Comments
7 min read
🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

Comments
2 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

1
Comments
7 min read
How to Monitor and Protect Your Google Activity History

How to Monitor and Protect Your Google Activity History

Comments
9 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Extending legacy healthcare software: RPA technology

Extending legacy healthcare software: RPA technology

10
Comments
4 min read
GitHub: signing commit in a workflow

GitHub: signing commit in a workflow

4
Comments
2 min read
The Adventures of Blink #17: Continuous Security... DevSecOps!

The Adventures of Blink #17: Continuous Security... DevSecOps!

Comments
5 min read
7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

17
Comments
4 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

2
Comments
6 min read
Common Security Vulnerabilities in the Blockchain World

Common Security Vulnerabilities in the Blockchain World

1
Comments
4 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
Activity Monitoring and Audit in AWS

Activity Monitoring and Audit in AWS

Comments
5 min read
Rethinking password security: say goodbye to plaintext passwords

Rethinking password security: say goodbye to plaintext passwords

3
Comments 2
5 min read
API Security Best Practices: Enable Good Governance

API Security Best Practices: Enable Good Governance

Comments
6 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Improving user experience with passwordless authentication

Improving user experience with passwordless authentication

4
Comments
5 min read
All You Need To Know To Secure Your Data From Phishing

All You Need To Know To Secure Your Data From Phishing

6
Comments
4 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments 1
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
loading...