DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Find & Secure Exposed Microsoft Azure Buckets in 2024

How to Find & Secure Exposed Microsoft Azure Buckets in 2024

Comments
5 min read
Whitehouse Declares Software Should Be Memory Safe

Whitehouse Declares Software Should Be Memory Safe

24
Comments 17
1 min read
Secure your API with these 16 Practices with Apache APISIX - part 1

Secure your API with these 16 Practices with Apache APISIX - part 1

15
Comments
7 min read
Issue 32 of AWS Cloud Security Weekly

Issue 32 of AWS Cloud Security Weekly

Comments
3 min read
How to manage Access Control in Solidity Smart Contract

How to manage Access Control in Solidity Smart Contract

4
Comments
3 min read
IAM Policy Conditions & SQS Queue Access

IAM Policy Conditions & SQS Queue Access

3
Comments
5 min read
Microservices security

Microservices security

Comments
6 min read
Building near real-time automatic remediation for disabled S3 Block Public Access with serverless tools

Building near real-time automatic remediation for disabled S3 Block Public Access with serverless tools

2
Comments
7 min read
Docker Security Scanning in GitLab

Docker Security Scanning in GitLab

Comments
3 min read
Implementing App Security – Here’s How To Do It

Implementing App Security – Here’s How To Do It

2
Comments
4 min read
Exploring Managed Kubernetes and the Integration of CNAPP

Exploring Managed Kubernetes and the Integration of CNAPP

Comments
6 min read
You need a Proxy Server to proctect you 🛡️🐞

You need a Proxy Server to proctect you 🛡️🐞

3
Comments
3 min read
What is SAML And Why You Should Care

What is SAML And Why You Should Care

16
Comments
7 min read
Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

10
Comments
9 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
AWS Config para análisis de seguridad

AWS Config para análisis de seguridad

Comments
1 min read
Top Secrets Management Tools for 2024

Top Secrets Management Tools for 2024

4
Comments 1
10 min read
DevSecOps MythBuster – “Git Clone and DevOps Backup Script is all I need for data protection”

DevSecOps MythBuster – “Git Clone and DevOps Backup Script is all I need for data protection”

Comments
4 min read
Essential Steps for Securing Your AWS Environment

Essential Steps for Securing Your AWS Environment

1
Comments 1
9 min read
Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

3
Comments
6 min read
Voice OTPs: Pioneering a New Era in Authentication Security

Voice OTPs: Pioneering a New Era in Authentication Security

Comments
4 min read
Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Comments
5 min read
Understand OAuth 2.0 code grant flow 🔐

Understand OAuth 2.0 code grant flow 🔐

12
Comments 1
5 min read
Double Down on Security: IAM MFA in AWS

Double Down on Security: IAM MFA in AWS

Comments
2 min read
Deploy SPFx app using pipeline's Workload Identity federation

Deploy SPFx app using pipeline's Workload Identity federation

Comments
4 min read
How to secure tenant payment methods?

How to secure tenant payment methods?

Comments 1
1 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
A Passwordless Future: Passkeys for Developers

A Passwordless Future: Passkeys for Developers

11
Comments
11 min read
Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Comments 3
6 min read
Secure Browser Access to code-server VSCode

Secure Browser Access to code-server VSCode

6
Comments 1
4 min read
AWS VPC Endpoint is NOT a security topic!?

AWS VPC Endpoint is NOT a security topic!?

7
Comments
3 min read
Quick guide to applying MuleSoft's API Autodiscovery

Quick guide to applying MuleSoft's API Autodiscovery

1
Comments
2 min read
Passwordless Authentication is the future !?

Passwordless Authentication is the future !?

Comments
3 min read
Securing API Keys in SwiftUI: A Practical Guide (Intro)

Securing API Keys in SwiftUI: A Practical Guide (Intro)

24
Comments
5 min read
ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis

ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis

1
Comments
4 min read
EBS, seus snapshots e quanto ocupam de espaço

EBS, seus snapshots e quanto ocupam de espaço

3
Comments
5 min read
What are some fun or scary vulnerabilities you heard about recently??

What are some fun or scary vulnerabilities you heard about recently??

7
Comments 2
1 min read
Fortifying Your Digital Presence: The Significance of Mobile App Security

Fortifying Your Digital Presence: The Significance of Mobile App Security

Comments
6 min read
Level up your vulnerability management skills . . . painlessly

Level up your vulnerability management skills . . . painlessly

2
Comments
1 min read
How to Set Up Runtime Monitoring ECS Cluster Using GuardDuty

How to Set Up Runtime Monitoring ECS Cluster Using GuardDuty

3
Comments
6 min read
AI TRiSM - Building trust in artificial intelligence

AI TRiSM - Building trust in artificial intelligence

1
Comments
3 min read
Securing your automation: A guide to ensuring Ansible Playbook security

Securing your automation: A guide to ensuring Ansible Playbook security

Comments
7 min read
Top Monitoring and Logging Tools: The Guardians of Digital Performance

Top Monitoring and Logging Tools: The Guardians of Digital Performance

Comments
2 min read
Secret values in Scala

Secret values in Scala

Comments 1
5 min read
Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

1
Comments
3 min read
Permission not granted - on failing to create cross-profile app pairs

Permission not granted - on failing to create cross-profile app pairs

Comments
5 min read
INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
Banana Decryption: Unpacking Caesar Cipher with Power Automate

Banana Decryption: Unpacking Caesar Cipher with Power Automate

8
Comments
1 min read
Working with Streams in Node.js

Working with Streams in Node.js

Comments
2 min read
Quick guide to secure/encrypt your properties in MuleSoft

Quick guide to secure/encrypt your properties in MuleSoft

1
Comments
1 min read
Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

2
Comments
2 min read
Approval Phishing Scams See Explosive Boost, With $347 Million Stolen in 2023 – Chainalysis

Approval Phishing Scams See Explosive Boost, With $347 Million Stolen in 2023 – Chainalysis

6
Comments
4 min read
IOT security

IOT security

Comments
2 min read
JavaScript Objects and its secret associates: Prototype

JavaScript Objects and its secret associates: Prototype

2
Comments
3 min read
What is Information Security Threats

What is Information Security Threats

Comments
2 min read
Shielding Your Kubernetes Network: Mastering iptables for Enhanced Security

Shielding Your Kubernetes Network: Mastering iptables for Enhanced Security

12
Comments
22 min read
The CORS Conundrum

The CORS Conundrum

7
Comments
8 min read
Secure Litestar APIs with OKTA

Secure Litestar APIs with OKTA

4
Comments
3 min read
What is a private key

What is a private key

Comments
5 min read
Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

7
Comments 4
1 min read
loading...