DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Power Platform - DLP Policies

Power Platform - DLP Policies

19
Comments 1
6 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

22
Comments
6 min read
Social media authentication: convenience vs privacy

Social media authentication: convenience vs privacy

1
Comments
5 min read
Advanced Analytics and Monitoring in Cyber Threat Detection

Advanced Analytics and Monitoring in Cyber Threat Detection

1
Comments
2 min read
10 Creative Ways to Use Social Media for Recruitment

10 Creative Ways to Use Social Media for Recruitment

1
Comments
3 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
Security fundamentals: buffer overflow

Security fundamentals: buffer overflow

1
Comments
14 min read
Next.js authentication using Clerk, Drizzle ORM, and Neon

Next.js authentication using Clerk, Drizzle ORM, and Neon

1
Comments
10 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

1
Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

2
Comments
3 min read
How to restrict default access to KMS via key policy with Terraform

How to restrict default access to KMS via key policy with Terraform

6
Comments 1
4 min read
Bridging Code and Security: Unveiling the Power of DevSecOps

Bridging Code and Security: Unveiling the Power of DevSecOps

6
Comments
13 min read
How Can AWS IAM Access Analyzer Help You Improve Security Checks in Your CI/CD Pipeline?

How Can AWS IAM Access Analyzer Help You Improve Security Checks in Your CI/CD Pipeline?

3
Comments
6 min read
Take the pain to learn user authentication before you use an external provider

Take the pain to learn user authentication before you use an external provider

8
Comments 3
6 min read
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

1
Comments
1 min read
CORS Error Explained and How to Fix It?

CORS Error Explained and How to Fix It?

25
Comments 3
3 min read
Secure protected API with HMAC! Next Level of API Keys 🔐

Secure protected API with HMAC! Next Level of API Keys 🔐

4
Comments
4 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

105
Comments 7
8 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Segurança de IA

Segurança de IA

1
Comments
6 min read
The internet is on fire again. This time it's XZ

The internet is on fire again. This time it's XZ

Comments 1
3 min read
Server access with SSH certificates - deep dive

Server access with SSH certificates - deep dive

1
Comments
3 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
Security news weekly round-up - 29th March 2024

Security news weekly round-up - 29th March 2024

5
Comments 1
4 min read
An Introductory Guide to AWS Identity and Access Management

An Introductory Guide to AWS Identity and Access Management

Comments
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

2
Comments
6 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

4
Comments
6 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

52
Comments
8 min read
60 Years of the IBM System/360: A Legacy of Reliability and Security

60 Years of the IBM System/360: A Legacy of Reliability and Security

2
Comments 1
2 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Make your Azure OpenAI apps compliant with RBAC

Make your Azure OpenAI apps compliant with RBAC

23
Comments
6 min read
Demystifying OAuth 2.0 with a Clubbing Analogy

Demystifying OAuth 2.0 with a Clubbing Analogy

2
Comments
3 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

6
Comments
3 min read
O que é HTTP?

O que é HTTP?

1
Comments
3 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

Comments 2
3 min read
Automatización para la creación de imágenes con Amazon EC2 Image Builder

Automatización para la creación de imágenes con Amazon EC2 Image Builder

3
Comments
14 min read
Securing the Cloud #23

Securing the Cloud #23

Comments
7 min read
🤖 Building RAG chatbot with NeMo Guardrails !💡

🤖 Building RAG chatbot with NeMo Guardrails !💡

1
Comments
2 min read
Understanding Firewalls: Your First Line of Cyber Defense

Understanding Firewalls: Your First Line of Cyber Defense

1
Comments
12 min read
AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

6
Comments
4 min read
How To Implement AWS SSB Controls in Terraform - Part 3

How To Implement AWS SSB Controls in Terraform - Part 3

3
Comments
15 min read
Understanding Security Group and Network Access Control List (NACL) in AWS

Understanding Security Group and Network Access Control List (NACL) in AWS

11
Comments
3 min read
Sloan's Inbox: Is security still an afterthought?

Sloan's Inbox: Is security still an afterthought?

8
Comments 7
2 min read
Navigating the Realm of Cloud Security on AWS

Navigating the Realm of Cloud Security on AWS

Comments
8 min read
Analysing the Differences between WebSocket and WebRTC

Analysing the Differences between WebSocket and WebRTC

4
Comments
6 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

1
Comments
5 min read
Seamless Security: Setting Up Biometric Authentication on Android Emulator & iOS Simulator

Seamless Security: Setting Up Biometric Authentication on Android Emulator & iOS Simulator

11
Comments 2
3 min read
What the heck is SSH

What the heck is SSH

4
Comments
1 min read
Security news weekly round-up - 22nd March 2024

Security news weekly round-up - 22nd March 2024

1
Comments
3 min read
Fundamental Concepts in Secure Environments

Fundamental Concepts in Secure Environments

Comments 1
2 min read
Civo Navigate 2024: Scaling Community And Containers In Austin

Civo Navigate 2024: Scaling Community And Containers In Austin

1
Comments
6 min read
loading...