DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Bridging Code and Security: Unveiling the Power of DevSecOps

Bridging Code and Security: Unveiling the Power of DevSecOps

6
Comments
13 min read
Securing Keycloak: Configuring Admin Access within Your Private Network

Securing Keycloak: Configuring Admin Access within Your Private Network

Comments
1 min read
How Can AWS IAM Access Analyzer Help You Improve Security Checks in Your CI/CD Pipeline?

How Can AWS IAM Access Analyzer Help You Improve Security Checks in Your CI/CD Pipeline?

3
Comments
6 min read
Take the pain to learn user authentication before you use an external provider

Take the pain to learn user authentication before you use an external provider

8
Comments 3
6 min read
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

1
Comments
1 min read
CORS Error Explained and How to Fix It?

CORS Error Explained and How to Fix It?

26
Comments 3
3 min read
Secure protected API with HMAC! Next Level of API Keys 🔐

Secure protected API with HMAC! Next Level of API Keys 🔐

5
Comments
4 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

105
Comments 7
8 min read
Cross-Site Scripting (XSS)

Cross-Site Scripting (XSS)

5
Comments 1
7 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Segurança de IA

Segurança de IA

1
Comments
6 min read
The internet is on fire again. This time it's XZ

The internet is on fire again. This time it's XZ

Comments 1
3 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
Server access with SSH certificates - deep dive

Server access with SSH certificates - deep dive

1
Comments
3 min read
Security news weekly round-up - 29th March 2024

Security news weekly round-up - 29th March 2024

5
Comments 1
4 min read
An Introductory Guide to AWS Identity and Access Management

An Introductory Guide to AWS Identity and Access Management

Comments
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

2
Comments
6 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

2
Comments
2 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

56
Comments 3
8 min read
60 Years of the IBM System/360: A Legacy of Reliability and Security

60 Years of the IBM System/360: A Legacy of Reliability and Security

2
Comments 1
2 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

4
Comments
6 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
Make your Azure OpenAI apps compliant with RBAC

Make your Azure OpenAI apps compliant with RBAC

23
Comments
6 min read
Demystifying OAuth 2.0 with a Clubbing Analogy

Demystifying OAuth 2.0 with a Clubbing Analogy

2
Comments
3 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

Preventing Sensitive Data Exposure During Electronic Signature Processes in Single Sign-on Applications

1
Comments
2 min read
API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

6
Comments
3 min read
O que ĂŠ HTTP?

O que ĂŠ HTTP?

1
Comments
3 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

Comments 2
3 min read
AutomatizaciĂłn para la creaciĂłn de imĂĄgenes con Amazon EC2 Image Builder

AutomatizaciĂłn para la creaciĂłn de imĂĄgenes con Amazon EC2 Image Builder

3
Comments
14 min read
Securing the Cloud #23

Securing the Cloud #23

Comments
7 min read
🤖 Building RAG chatbot with NeMo Guardrails !💡

🤖 Building RAG chatbot with NeMo Guardrails !💡

1
Comments
2 min read
Understanding Firewalls: Your First Line of Cyber Defense

Understanding Firewalls: Your First Line of Cyber Defense

1
Comments
12 min read
AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

AWS EC2 IMDS(Instance Metadata Service ) all that you need to know

7
Comments
4 min read
How To Implement AWS SSB Controls in Terraform - Part 3

How To Implement AWS SSB Controls in Terraform - Part 3

3
Comments
15 min read
Understanding Security Group and Network Access Control List (NACL) in AWS

Understanding Security Group and Network Access Control List (NACL) in AWS

11
Comments
3 min read
Sloan's Inbox: Is security still an afterthought?

Sloan's Inbox: Is security still an afterthought?

8
Comments 7
2 min read
Navigating the Realm of Cloud Security on AWS

Navigating the Realm of Cloud Security on AWS

Comments
8 min read
Analysing the Differences between WebSocket and WebRTC

Analysing the Differences between WebSocket and WebRTC

4
Comments
6 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

1
Comments
5 min read
Seamless Security: Setting Up Biometric Authentication on Android Emulator & iOS Simulator

Seamless Security: Setting Up Biometric Authentication on Android Emulator & iOS Simulator

12
Comments 2
3 min read
What the heck is SSH

What the heck is SSH

4
Comments
1 min read
Security news weekly round-up - 22nd March 2024

Security news weekly round-up - 22nd March 2024

1
Comments
3 min read
Fundamental Concepts in Secure Environments

Fundamental Concepts in Secure Environments

Comments 1
2 min read
Civo Navigate 2024: Scaling Community And Containers In Austin

Civo Navigate 2024: Scaling Community And Containers In Austin

1
Comments
6 min read
File Injection and Path Traversal vulnerabilities

File Injection and Path Traversal vulnerabilities

1
Comments
4 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
Ask: Static Code Analysis Tools.

Ask: Static Code Analysis Tools.

Comments 2
1 min read
Top Password Managers for 2024

Top Password Managers for 2024

1
Comments
4 min read
Linux Exfiltration

Linux Exfiltration

9
Comments 2
3 min read
Workflow Integration with AI: A Unified Approach to Development

Workflow Integration with AI: A Unified Approach to Development

10
Comments
10 min read
Mastering File Upload Security: DoS and Antivirus

Mastering File Upload Security: DoS and Antivirus

31
Comments
9 min read
Atlassian security incidents: 2023 in Review

Atlassian security incidents: 2023 in Review

Comments
8 min read
6 Tools To Help Keep Your Dependencies And Code More Secure

6 Tools To Help Keep Your Dependencies And Code More Secure

29
Comments 4
8 min read
Adding Clerk Authentication to a NextJS App

Adding Clerk Authentication to a NextJS App

29
Comments 1
4 min read
WebAuthn Cheat Sheet for Developers

WebAuthn Cheat Sheet for Developers

Comments
2 min read
loading...