DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How To Implement AWS SSB Controls in Terraform - Part 4

How To Implement AWS SSB Controls in Terraform - Part 4

2
Comments
11 min read
Identity and Access Management (IAM)

Identity and Access Management (IAM)

Comments
2 min read
Exploring FAPI 2.0: The Latest in API Security Technology

Exploring FAPI 2.0: The Latest in API Security Technology

1
Comments
32 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
The ROI of paying open source maintainers (in light of the xz utils backdoor)

The ROI of paying open source maintainers (in light of the xz utils backdoor)

1
Comments 1
7 min read
Azure Managed Identities: No more secrets

Azure Managed Identities: No more secrets

1
Comments
4 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Enhancing API Security: Best Practices for Developers

Enhancing API Security: Best Practices for Developers

4
Comments 2
2 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
Gerenciando informações e eventos de segurança - SIEM

Gerenciando informações e eventos de segurança - SIEM

3
Comments
3 min read
Analyzing Software Supply Chain Security with Graph Analytics

Analyzing Software Supply Chain Security with Graph Analytics

Comments
1 min read
"Keep everything online"

"Keep everything online"

Comments
3 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

2
Comments
3 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
12 Free Courses To Help You Develop More Secure Software - Shift Security Left

12 Free Courses To Help You Develop More Secure Software - Shift Security Left

9
Comments
6 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
PrivatePing - A Secure Messaging Application

PrivatePing - A Secure Messaging Application

5
Comments
2 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

2
Comments
5 min read
How to generate a secure and robust SSH key in 2024

How to generate a secure and robust SSH key in 2024

57
Comments 2
2 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
How to secure an existing SSH key with a passphrase

How to secure an existing SSH key with a passphrase

7
Comments
2 min read
Why using a passphrase to secure your SSH key ?

Why using a passphrase to secure your SSH key ?

8
Comments
2 min read
Integer overflow vulnerabilities in .NET

Integer overflow vulnerabilities in .NET

1
Comments
3 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
Securing the Cloud #25

Securing the Cloud #25

Comments
4 min read
Security news weekly round-up - 5th April 2024

Security news weekly round-up - 5th April 2024

1
Comments
3 min read
Infrastructure protection on AWS for Beginners

Infrastructure protection on AWS for Beginners

Comments
7 min read
🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

Comments
2 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

1
Comments
7 min read
How to Monitor and Protect Your Google Activity History

How to Monitor and Protect Your Google Activity History

Comments
9 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Extending legacy healthcare software: RPA technology

Extending legacy healthcare software: RPA technology

10
Comments
4 min read
GitHub: signing commit in a workflow

GitHub: signing commit in a workflow

4
Comments
2 min read
The Adventures of Blink #17: Continuous Security... DevSecOps!

The Adventures of Blink #17: Continuous Security... DevSecOps!

Comments
5 min read
7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

17
Comments
4 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

2
Comments
6 min read
Common Security Vulnerabilities in the Blockchain World

Common Security Vulnerabilities in the Blockchain World

1
Comments
4 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
Activity Monitoring and Audit in AWS

Activity Monitoring and Audit in AWS

Comments
5 min read
Rethinking password security: say goodbye to plaintext passwords

Rethinking password security: say goodbye to plaintext passwords

3
Comments 2
5 min read
API Security Best Practices: Enable Good Governance

API Security Best Practices: Enable Good Governance

Comments
6 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Improving user experience with passwordless authentication

Improving user experience with passwordless authentication

4
Comments
5 min read
All You Need To Know To Secure Your Data From Phishing

All You Need To Know To Secure Your Data From Phishing

6
Comments
4 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments 1
3 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Power Platform - DLP Policies

Power Platform - DLP Policies

19
Comments 1
6 min read
The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

The good, the bad and the ugly of the XZ vulnerability (CVE 2024-3094)

22
Comments
6 min read
Social media authentication: convenience vs privacy

Social media authentication: convenience vs privacy

1
Comments
5 min read
Advanced Analytics and Monitoring in Cyber Threat Detection

Advanced Analytics and Monitoring in Cyber Threat Detection

1
Comments
2 min read
10 Creative Ways to Use Social Media for Recruitment

10 Creative Ways to Use Social Media for Recruitment

1
Comments
3 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
Security fundamentals: buffer overflow

Security fundamentals: buffer overflow

1
Comments
14 min read
Next.js authentication using Clerk, Drizzle ORM, and Neon

Next.js authentication using Clerk, Drizzle ORM, and Neon

1
Comments
10 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

2
Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

2
Comments
3 min read
How to restrict default access to KMS via key policy with Terraform

How to restrict default access to KMS via key policy with Terraform

6
Comments 1
4 min read
loading...