DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
Issue 43 of AWS Cloud Security Weekly

Issue 43 of AWS Cloud Security Weekly

4
Comments
2 min read
Using Verified Permissions with Cognito to control access to API endpoints

Using Verified Permissions with Cognito to control access to API endpoints

1
Comments
7 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

2
Comments
6 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Securing the Cloud #29

Securing the Cloud #29

5
Comments
3 min read
Password Management: Passwordless Login

Password Management: Passwordless Login

10
Comments 2
8 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

5
Comments
3 min read
The Benefits of Opting Out from Using OfficialUSA.com

The Benefits of Opting Out from Using OfficialUSA.com

1
Comments 1
4 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

1
Comments
3 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
AWS Credentials for Serverless

AWS Credentials for Serverless

7
Comments
8 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

19
Comments
9 min read
Are Your Secrets Projects Truly Safe?🔐

Are Your Secrets Projects Truly Safe?🔐

Comments 2
2 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Client assertion in OAuth 2.0 client authentication

Client assertion in OAuth 2.0 client authentication

12
Comments
4 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Threat Modeling for Developers

Threat Modeling for Developers

24
Comments 2
3 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Frontend Web Security - Protecting Against Common Threats

Frontend Web Security - Protecting Against Common Threats

Comments
2 min read
Comparing token-based authentication and session-based authentication

Comparing token-based authentication and session-based authentication

19
Comments 2
4 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

10
Comments
1 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

35
Comments
2 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Syncing AWS Secrets Manager across accounts

Syncing AWS Secrets Manager across accounts

7
Comments
2 min read
Detect AES in ECB mode

Detect AES in ECB mode

1
Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

3
Comments
8 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

5
Comments
6 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

12
Comments
7 min read
O que é SOAR?

O que é SOAR?

6
Comments
4 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
Safeguarding Avalonia Apps with ByteHide Shield 🛡️

Safeguarding Avalonia Apps with ByteHide Shield 🛡️

2
Comments
2 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

6
Comments
2 min read
Database Encryption: Secure Your Data with Best Practices

Database Encryption: Secure Your Data with Best Practices

1
Comments
1 min read
Locally test and validate your Renovate configuration files

Locally test and validate your Renovate configuration files

Comments
3 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

5
Comments 2
2 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

7
Comments
13 min read
Build and host your own observability solution

Build and host your own observability solution

1
Comments
4 min read
JWT Explained

JWT Explained

68
Comments 15
3 min read
Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Heartbleed and XZ Backdoor Learnings: Open Source Infrastructure Can Be Improved Efficiently With Moderate Funding

Comments
5 min read
AppArmor testsuite

AppArmor testsuite

1
Comments
1 min read
Security news weekly round-up - 10 May 2024

Security news weekly round-up - 10 May 2024

2
Comments 2
2 min read
Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

11
Comments
2 min read
Applying security principles to avoid getting pickpocketed

Applying security principles to avoid getting pickpocketed

Comments
4 min read
Securing the Cloud #28

Securing the Cloud #28

Comments
4 min read
How To Manage AWS Security Hub in AWS Organizations Using Terraform

How To Manage AWS Security Hub in AWS Organizations Using Terraform

3
Comments 2
7 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
How Security Testing Is Becoming an Integral Part of Quality Assurance (QA)

How Security Testing Is Becoming an Integral Part of Quality Assurance (QA)

Comments
3 min read
Managing SSH Keys Across Multiple Devices

Managing SSH Keys Across Multiple Devices

5
Comments 4
3 min read
loading...