DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Startup Life: From DevOps to Filling Out Compliance Spreadsheets

Startup Life: From DevOps to Filling Out Compliance Spreadsheets

1
Comments
3 min read
Secure Your Spring Boot API with JWT and Role-Based Authorization

Secure Your Spring Boot API with JWT and Role-Based Authorization

1
Comments
5 min read
Terraforming the Cloud

Terraforming the Cloud

16
Comments 13
2 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
⚠ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

⚠ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

10
Comments 5
1 min read
Managing Service Accounts in Multicluster Environments with RHACM

Managing Service Accounts in Multicluster Environments with RHACM

Comments
7 min read
🚹 Stop Using ChatGPT Agents Until You Read This First!

🚹 Stop Using ChatGPT Agents Until You Read This First!

38
Comments 7
4 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
Using chroot to Restrict Linux Applications for Enhanced Security

Using chroot to Restrict Linux Applications for Enhanced Security

1
Comments
4 min read
How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.