DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Address Sensitive Data Sprawl

How to Address Sensitive Data Sprawl

4
Comments
7 min read
The risks of using vulnerable dependencies in your project, and how SCA helps manage them

The risks of using vulnerable dependencies in your project, and how SCA helps manage them

3
Comments
3 min read
[Ask] For Server linux security is this enough ?

[Ask] For Server linux security is this enough ?

Comments
1 min read
How to log in to multiple AWS accounts — the easy way

How to log in to multiple AWS accounts — the easy way

Comments
3 min read
10 best practices to containerize Node.js web applications with Docker

10 best practices to containerize Node.js web applications with Docker

3
Comments
28 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

7
Comments 1
8 min read
Não perca tempo criando sistema de autenticação

Não perca tempo criando sistema de autenticação

9
Comments
3 min read
How Cross-Site Request Forgery Works

How Cross-Site Request Forgery Works

7
Comments
4 min read
Do not use default SAM CloudFormation Role for Production

Do not use default SAM CloudFormation Role for Production

8
Comments 1
5 min read
Spin up secure HTTPS proxy in less than 10 minutes

Spin up secure HTTPS proxy in less than 10 minutes

5
Comments
5 min read
Appwrite Loves Open Source: Why I Chose To Sponsor Offen

Appwrite Loves Open Source: Why I Chose To Sponsor Offen

28
Comments 1
4 min read
RPKI , securing BGP Infrastructure - with Lab

RPKI , securing BGP Infrastructure - with Lab

6
Comments
9 min read
React XSS

React XSS

Comments
4 min read
O JavaScript não é seguro...

O JavaScript não é seguro...

Comments
5 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

7
Comments
4 min read
Admission Controllers in Action: Datree's Approach

Admission Controllers in Action: Datree's Approach

10
Comments
6 min read
AWS Backup adds Amazon CloudWatch metrics to its console dashboard

AWS Backup adds Amazon CloudWatch metrics to its console dashboard

6
Comments
1 min read
OIDC Forever, IAM Credentials Never!

OIDC Forever, IAM Credentials Never!

35
Comments 6
8 min read
Using Proxychains in JMeter

Using Proxychains in JMeter

20
Comments
8 min read
SIEM VS SOC & HOW SIEM WORKS!!

SIEM VS SOC & HOW SIEM WORKS!!

6
Comments
6 min read
Introduction to User Authentication for Microservices

Introduction to User Authentication for Microservices

11
Comments
5 min read
Debugging generic API Gateway errors with access logs

Debugging generic API Gateway errors with access logs

9
Comments 4
4 min read
OWAST Top 10 vulnerabilities and how to approach them

OWAST Top 10 vulnerabilities and how to approach them

7
Comments
10 min read
Environment variables & Its best practices

Environment variables & Its best practices

33
Comments 2
4 min read
How To: Issue Triage via Phylum Extensions

How To: Issue Triage via Phylum Extensions

8
Comments
4 min read
loading...