DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Password Management: The Basics

Password Management: The Basics

11
Comments 9
10 min read
The XZ attack and timeline

The XZ attack and timeline

25
Comments 3
6 min read
Cors Workflow

Cors Workflow

1
Comments
2 min read
Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

6
Comments
2 min read
Compliant infrastructure using infrastructure as code

Compliant infrastructure using infrastructure as code

2
Comments
6 min read
Content Delivery Network Explained 🌎⚡️

Content Delivery Network Explained 🌎⚡️

4
Comments
4 min read
Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

6
Comments
2 min read
10 Ways To Ensure Successful Mobile App Security

10 Ways To Ensure Successful Mobile App Security

1
Comments
4 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

37
Comments 1
6 min read
Ngrok: Exposing local server on the internet

Ngrok: Exposing local server on the internet

Comments
3 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

7
Comments 1
2 min read
HackTheBox - Writeup Surveillance [Retired]

HackTheBox - Writeup Surveillance [Retired]

Comments
15 min read
SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

SmartVerify : Securing Smart Contracts with Our ML-Powered Solidity Vulnerability Scanner WebApp

12
Comments 7
4 min read
Securing the Cloud #27

Securing the Cloud #27

Comments
2 min read
Security news weekly round-up - 19th April 2024

Security news weekly round-up - 19th April 2024

Comments
2 min read
GenAI Series: Protegiendo tus modelos de IA

GenAI Series: Protegiendo tus modelos de IA

6
Comments
5 min read
A rant on data breaches

A rant on data breaches

Comments
2 min read
Data Security and Cryptography on AWS

Data Security and Cryptography on AWS

Comments
3 min read
Security : CVE-2024-3094 unauthorized remote SSH access

Security : CVE-2024-3094 unauthorized remote SSH access

3
Comments
2 min read
Security Enhancements in React Native Apps

Security Enhancements in React Native Apps

29
Comments
3 min read
Importance of Cyber Security in Business Continuity

Importance of Cyber Security in Business Continuity

Comments
3 min read
Migrating to Chainguard Images: less CVEs for safer container runtimes

Migrating to Chainguard Images: less CVEs for safer container runtimes

10
Comments 1
3 min read
Observability and Security with AWS

Observability and Security with AWS

Comments
4 min read
Solving AWS Network Puzzles with Mathematics - Part 1

Solving AWS Network Puzzles with Mathematics - Part 1

3
Comments
7 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
US government warns against C and C++ code

US government warns against C and C++ code

5
Comments
4 min read
GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

Comments
5 min read
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

2
Comments 1
10 min read
Policy-Based Access Control (PBAC): A Comprehensive Overview

Policy-Based Access Control (PBAC): A Comprehensive Overview

10
Comments 1
8 min read
Loop DOS? Letś Discuss.

Loop DOS? Letś Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
Mastering JWT Security

Mastering JWT Security

91
Comments 18
3 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

9
Comments
11 min read
Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Comments
2 min read
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
Are hackers watching your screen right now?

Are hackers watching your screen right now?

18
Comments 1
3 min read
How is Amazon Web Services ensuring AI is Securely handling Our Data?

How is Amazon Web Services ensuring AI is Securely handling Our Data?

1
Comments
5 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
6 security advancements that Plang offers for the user

6 security advancements that Plang offers for the user

Comments
2 min read
Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Comments
5 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
Better Threat Detection with CloudWatch Logs and Generative AI

Better Threat Detection with CloudWatch Logs and Generative AI

1
Comments
6 min read
Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images

7
Comments
7 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
Protect API Gateway with Amazon Verified Permissions

Protect API Gateway with Amazon Verified Permissions

3
Comments 2
8 min read
Data Privacy in API Integrations

Data Privacy in API Integrations

3
Comments
5 min read
Beyond the login screen

Beyond the login screen

1
Comments
5 min read
Authentication using JSON Web Tokens.

Authentication using JSON Web Tokens.

8
Comments
4 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
Enhancing AWS Monitoring for Improved Threat Management

Enhancing AWS Monitoring for Improved Threat Management

Comments
2 min read
🔐Simple Yet Crucial step to avoid security incidents💡

🔐Simple Yet Crucial step to avoid security incidents💡

5
Comments
1 min read
Securing Your Web Application with AWS WAF and AWS Shield

Securing Your Web Application with AWS WAF and AWS Shield

Comments
5 min read
Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

6
Comments
6 min read
Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments 2
3 min read
loading...