DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Civo Navigate 2024: Scaling Community And Containers In Austin

Civo Navigate 2024: Scaling Community And Containers In Austin

1
Comments
6 min read
File Injection and Path Traversal vulnerabilities

File Injection and Path Traversal vulnerabilities

1
Comments
4 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
Ask: Static Code Analysis Tools.

Ask: Static Code Analysis Tools.

Comments 2
1 min read
Top Password Managers for 2024

Top Password Managers for 2024

1
Comments
4 min read
Linux Exfiltration

Linux Exfiltration

9
Comments 2
3 min read
Workflow Integration with AI: A Unified Approach to Development

Workflow Integration with AI: A Unified Approach to Development

10
Comments
10 min read
Mastering File Upload Security: DoS and Antivirus

Mastering File Upload Security: DoS and Antivirus

31
Comments
9 min read
Atlassian security incidents: 2023 in Review

Atlassian security incidents: 2023 in Review

Comments
8 min read
6 Tools To Help Keep Your Dependencies And Code More Secure

6 Tools To Help Keep Your Dependencies And Code More Secure

29
Comments 4
8 min read
Adding Clerk Authentication to a NextJS App

Adding Clerk Authentication to a NextJS App

28
Comments 1
4 min read
WebAuthn Cheat Sheet for Developers

WebAuthn Cheat Sheet for Developers

Comments
2 min read
Security in AWS: IAM Best Practices and Advanced Techniques

Security in AWS: IAM Best Practices and Advanced Techniques

11
Comments
13 min read
SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

30
Comments 3
3 min read
What is JWT ?

What is JWT ?

5
Comments
2 min read
Best Practices for Configuring Rate Limits to Prevent DDoS

Best Practices for Configuring Rate Limits to Prevent DDoS

Comments
6 min read
Zero Trust and API Security: Implementing Robust Authentication with Edge Stack

Zero Trust and API Security: Implementing Robust Authentication with Edge Stack

Comments
5 min read
Apple Announces PQ3

Apple Announces PQ3

1
Comments
1 min read
Understanding the Principle of "Least Privilege" in AWS

Understanding the Principle of "Least Privilege" in AWS

Comments
2 min read
How To Implement AWS SSB Controls in Terraform - Part 2

How To Implement AWS SSB Controls in Terraform - Part 2

3
Comments
9 min read
Securing the Cloud #22

Securing the Cloud #22

Comments
5 min read
How To Implement AWS SSB Controls in Terraform - Part 1

How To Implement AWS SSB Controls in Terraform - Part 1

8
Comments
10 min read
Introduction to Cryptography in Python

Introduction to Cryptography in Python

1
Comments
2 min read
Strengthening the Secure Supply Chain

Strengthening the Secure Supply Chain

1
Comments
12 min read
ASP.Net 9.0: Authentication Enhancements

ASP.Net 9.0: Authentication Enhancements

8
Comments 2
2 min read
Building a Universally Portable Python App

Building a Universally Portable Python App

13
Comments
5 min read
Announcing our Capture the Flag Challenge: broken-navigator

Announcing our Capture the Flag Challenge: broken-navigator

5
Comments
2 min read
How do you balance code completeness, security, and maintainability when creating example code?

How do you balance code completeness, security, and maintainability when creating example code?

3
Comments
1 min read
You're Installing Node.js Wrong. That's OK, Here Is How To Fix It 🙌

You're Installing Node.js Wrong. That's OK, Here Is How To Fix It 🙌

19
Comments 2
3 min read
Workshop - How to Write Custom Security Tests

Workshop - How to Write Custom Security Tests

Comments
1 min read
Start to Learn Secure App with Ruby on Rails

Start to Learn Secure App with Ruby on Rails

3
Comments
6 min read
The importance of stateless architecture in authorization systems

The importance of stateless architecture in authorization systems

Comments
7 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
GitLab Vulnerabilities And Security Incidents: 2023 In Review

GitLab Vulnerabilities And Security Incidents: 2023 In Review

Comments
7 min read
Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Takeaways from SANS 2024 AI Security Trends + Predictions đź”®

Comments
2 min read
A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey

A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey

5
Comments
2 min read
Integrate an Audit Trail for NextAuth.js in a few lines of code

Integrate an Audit Trail for NextAuth.js in a few lines of code

4
Comments
3 min read
REST API Security Comprehensive Guide

REST API Security Comprehensive Guide

1
Comments
6 min read
Nodejs Security - What You Need To Know - Live Stream

Nodejs Security - What You Need To Know - Live Stream

11
Comments 1
2 min read
Checklist for designing cloud-native applications – Part 2: Security aspects

Checklist for designing cloud-native applications – Part 2: Security aspects

2
Comments
7 min read
SecretService: Library for Storing Secrets in Google Apps Script

SecretService: Library for Storing Secrets in Google Apps Script

Comments
2 min read
Finding the Optimal Bcrypt Rounds for Your Machine

Finding the Optimal Bcrypt Rounds for Your Machine

Comments
3 min read
Understanding Bcrypt Rounds: Balancing Security and Performance

Understanding Bcrypt Rounds: Balancing Security and Performance

Comments
2 min read
Help: Trying to read the Private Key from Windows Certificate Store for Mutual Authentication

Help: Trying to read the Private Key from Windows Certificate Store for Mutual Authentication

Comments
1 min read
Accessing local services with SSRF attacks

Accessing local services with SSRF attacks

5
Comments
5 min read
Understanding SDLC and How Security Plays Into it

Understanding SDLC and How Security Plays Into it

1
Comments
5 min read
Democratising Enterprise Readiness - #MarchWebSecurity

Democratising Enterprise Readiness - #MarchWebSecurity

11
Comments 1
4 min read
GitHub Actions for Secret Management

GitHub Actions for Secret Management

14
Comments
3 min read
Unlocking the Power of WebAssembly

Unlocking the Power of WebAssembly

Comments
4 min read
Understanding Linux Basic Permissions: A Comprehensive Guide

Understanding Linux Basic Permissions: A Comprehensive Guide

1
Comments
2 min read
Biometric authentication with Passkeys

Biometric authentication with Passkeys

4
Comments
6 min read
The Role of CNAPP in Modern DevSecOps

The Role of CNAPP in Modern DevSecOps

Comments
5 min read
Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

1
Comments
8 min read
Securing Your Node.js Application: Best Practices and Strategies

Securing Your Node.js Application: Best Practices and Strategies

1
Comments
3 min read
What's New With AWS Security? | February Edition

What's New With AWS Security? | February Edition

3
Comments 1
3 min read
Building Digital Trust: A Look at Top Identity Verification Solutions

Building Digital Trust: A Look at Top Identity Verification Solutions

Comments
2 min read
Android Security Tips

Android Security Tips

2
Comments
3 min read
User Login Systems: An Overview

User Login Systems: An Overview

2
Comments
5 min read
What Are The Risks of a Quantum Apocalypse, and Should We Worry?

What Are The Risks of a Quantum Apocalypse, and Should We Worry?

1
Comments 1
8 min read
The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

Comments
3 min read
loading...