DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Next.js: Crafting a Strict CSP

Next.js: Crafting a Strict CSP

1
Comments 1
4 min read
Securing Fedora Linux with SELinux: A Comprehensive Guide

Securing Fedora Linux with SELinux: A Comprehensive Guide

4
Comments
3 min read
Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Comments
2 min read
Let's Play Snyk 🐶

Let's Play Snyk 🐶

2
Comments 4
5 min read
To Polyfill Or Not To Polyfill.io

To Polyfill Or Not To Polyfill.io

20
Comments
4 min read
How to hide files or data in a JPEG Image

How to hide files or data in a JPEG Image

38
Comments 11
4 min read
Optimizing Security in the Cloud: Leveraging the Microsoft 365 Security Baseline

Optimizing Security in the Cloud: Leveraging the Microsoft 365 Security Baseline

Comments
3 min read
Goal-Based Penetration Testing

Goal-Based Penetration Testing

Comments
1 min read
Realizing an RBAC scheme in Laravel Nova

Realizing an RBAC scheme in Laravel Nova

Comments
1 min read
What is DSPM? Data Security Posture Management Explained

What is DSPM? Data Security Posture Management Explained

Comments
2 min read
21 Days of DevOps Interview - Day 9- How to secure your Linux system

21 Days of DevOps Interview - Day 9- How to secure your Linux system

Comments
2 min read
Secure and Efficient Administrator Management in Modern Applications

Secure and Efficient Administrator Management in Modern Applications

1
Comments
2 min read
Simplify Configuration Management for Efficient Cloud Operations

Simplify Configuration Management for Efficient Cloud Operations

Comments
3 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Issue 34 of AWS Cloud Security Weekly

Issue 34 of AWS Cloud Security Weekly

Comments
2 min read
AWS VPC Endpoint is JUST a FinOps topic!?

AWS VPC Endpoint is JUST a FinOps topic!?

2
Comments
3 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Key derivation in .NET using HKDF

Key derivation in .NET using HKDF

Comments
3 min read
From Novice to Expert: Building Robust Security with Kubernetes RBAC

From Novice to Expert: Building Robust Security with Kubernetes RBAC

Comments
3 min read
Quick Guide to Parameterized Queries in SQL

Quick Guide to Parameterized Queries in SQL

Comments
1 min read
Top 10 Security Best Practices we learned the hard way

Top 10 Security Best Practices we learned the hard way

8
Comments 2
9 min read
Enhance Kubernetes Protection using SecurityContext Capabilities

Enhance Kubernetes Protection using SecurityContext Capabilities

Comments 1
3 min read
Optimizing Data Security in Hyper-V Environments with Advanced Windows Server Backup Strategies

Optimizing Data Security in Hyper-V Environments with Advanced Windows Server Backup Strategies

Comments
2 min read
Exploring Port Scanning with the "net" Package in Go

Exploring Port Scanning with the "net" Package in Go

Comments
4 min read
What if anyone steals your JWT

What if anyone steals your JWT

Comments
1 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
How to resolve vulnerabilities in Front-End Applications

How to resolve vulnerabilities in Front-End Applications

2
Comments
4 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Ionic + Capacitor Security Tips

Ionic + Capacitor Security Tips

2
Comments
3 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

3
Comments
7 min read
Training data poisoning to get what you want in LLMs, A Question

Training data poisoning to get what you want in LLMs, A Question

Comments
2 min read
Dynamic AWS IAM Policies

Dynamic AWS IAM Policies

Comments
4 min read
Understanding How NGINX and HAProxy Improve Response Times (DDoS Testing)

Understanding How NGINX and HAProxy Improve Response Times (DDoS Testing)

Comments
1 min read
Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

26
Comments
3 min read
Proxy VS Reverse Proxy

Proxy VS Reverse Proxy

15
Comments 5
4 min read
Transfer contents and files using SCP from remote to local machine via bastion

Transfer contents and files using SCP from remote to local machine via bastion

7
Comments
2 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

5
Comments
8 min read
The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

Comments
3 min read
How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

1
Comments
5 min read
Share Objects from Private S3 Buckets using CloudFront

Share Objects from Private S3 Buckets using CloudFront

Comments
11 min read
Using WordPress Nonces

Using WordPress Nonces

Comments
4 min read
GitHub Security Best Practices Every Developer Should Know

GitHub Security Best Practices Every Developer Should Know

40
Comments 6
4 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

4
Comments
2 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

37
Comments 3
12 min read
Protegendo APIs da Esquerda para a Direita (e em td no meio do caminho) [Tradução +/- Comentada]

Protegendo APIs da Esquerda para a Direita (e em td no meio do caminho) [Tradução +/- Comentada]

6
Comments
18 min read
Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

18
Comments
8 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

12
Comments 6
5 min read
Integrating Azure Secrets into your .NET Web Application

Integrating Azure Secrets into your .NET Web Application

Comments
3 min read
Securing Grafana for Web Access

Securing Grafana for Web Access

2
Comments
5 min read
OAuth2 explained: Bob's tale

OAuth2 explained: Bob's tale

1
Comments
2 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

13
Comments
4 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

2
Comments
4 min read
PassKey in Go

PassKey in Go

25
Comments 2
9 min read
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

6
Comments 1
5 min read
Overcoming Challenges in Containerized Microservices Architecture: A Case Study

Overcoming Challenges in Containerized Microservices Architecture: A Case Study

1
Comments
2 min read
#DevOps para noobs - Proxy Reverso

#DevOps para noobs - Proxy Reverso

199
Comments 12
3 min read
How to Secure Your AWS Account Using a Hardware security key [YubiKey]

How to Secure Your AWS Account Using a Hardware security key [YubiKey]

7
Comments
3 min read
loading...