DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Convert to workload identity federation

Convert to workload identity federation

Comments
2 min read
Interactive description of iptables tables

Interactive description of iptables tables

Comments
1 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024đŸ’»đŸ”

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024đŸ’»đŸ”

Comments
4 min read
Process and data isolation strategies pt. 1 - Sandboxes and Process imprisonment

Process and data isolation strategies pt. 1 - Sandboxes and Process imprisonment

Comments
4 min read
How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

Comments
4 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
Why you should sign your commits, and not only how.

Why you should sign your commits, and not only how.

5
Comments
3 min read
PostgreSQL. How to check connections that are not using SSL encryption?

PostgreSQL. How to check connections that are not using SSL encryption?

1
Comments
2 min read
Creating Passkey Authentication in a Rails 7 Application

Creating Passkey Authentication in a Rails 7 Application

1
Comments
4 min read
DynamoDB now supports resource-based policies. But is that a good idea?

DynamoDB now supports resource-based policies. But is that a good idea?

Comments
5 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
What Kills Your Flash Drive and How You Can Avoid It?

What Kills Your Flash Drive and How You Can Avoid It?

1
Comments
3 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

1
Comments
5 min read
Llavero Wallet: My Vault

Llavero Wallet: My Vault

3
Comments 1
4 min read
🎭 XSS Exposed: The Good, the Bad, and the Ugly! đŸ§‘â€đŸ’»

🎭 XSS Exposed: The Good, the Bad, and the Ugly! đŸ§‘â€đŸ’»

5
Comments
2 min read
Elevate Your DevOps and Cloud Engineering Journey

Elevate Your DevOps and Cloud Engineering Journey

Comments
4 min read
Securing the Cloud #23

Securing the Cloud #23

Comments
7 min read
Create Certificate Authority with AWS Private CA SDK

Create Certificate Authority with AWS Private CA SDK

4
Comments
4 min read
How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

How To Manage Amazon GuardDuty in AWS Organizations Using Terraform

1
Comments
6 min read
Better Threat Detection with CloudWatch Logs and Generative AI

Better Threat Detection with CloudWatch Logs and Generative AI

1
Comments
6 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Presenting the Ultimate Web App and API Security Scanning Tool: ZeroThreat

Comments
5 min read
Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

Mitigating the iconv Vulnerability for PHP (CVE-2024-2961)

3
Comments
3 min read
Navigating the Realm of Cloud Security on AWS

Navigating the Realm of Cloud Security on AWS

Comments
8 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
What is JWT ?

What is JWT ?

2
Comments
2 min read
The XZ attack and timeline

The XZ attack and timeline

23
Comments 3
6 min read
WebAuthn Cheat Sheet for Developers

WebAuthn Cheat Sheet for Developers

Comments
2 min read
Best Practices for Configuring Rate Limits to Prevent DDoS

Best Practices for Configuring Rate Limits to Prevent DDoS

Comments
6 min read
Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

Enhancing React App Security: Implementing Inactivity Logout for Peace of Mind

3
Comments
2 min read
Compliant infrastructure using infrastructure as code

Compliant infrastructure using infrastructure as code

2
Comments
6 min read
Content Delivery Network Explained đŸŒŽâšĄïž

Content Delivery Network Explained đŸŒŽâšĄïž

2
Comments
4 min read
10 Ways To Ensure Successful Mobile App Security

10 Ways To Ensure Successful Mobile App Security

1
Comments
4 min read
Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

Unlock Superior Security: Implementing 2FA in Ruby on Rails with a Twist!

1
Comments
2 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

35
Comments 1
6 min read
Ngrok: Exposing local server on the internet

Ngrok: Exposing local server on the internet

Comments
3 min read
Ask: Static Code Analysis Tools.

Ask: Static Code Analysis Tools.

Comments 2
1 min read
The internet is on fire again. This time it's XZ

The internet is on fire again. This time it's XZ

Comments 1
3 min read
A rant on data breaches

A rant on data breaches

Comments
2 min read
GenAI Series: Protegiendo tu IA Generativa

GenAI Series: Protegiendo tu IA Generativa

5
Comments
5 min read
Security : CVE-2024-3094 unauthorized remote SSH access

Security : CVE-2024-3094 unauthorized remote SSH access

3
Comments
2 min read
Securing Apps In React Native

Securing Apps In React Native

7
Comments
3 min read
Observability and Security with AWS

Observability and Security with AWS

Comments
4 min read
Migrating to Chainguard Images: less CVEs for safer container runtimes

Migrating to Chainguard Images: less CVEs for safer container runtimes

8
Comments 1
3 min read
Why adopt passkeys?

Why adopt passkeys?

3
Comments
5 min read
Solving AWS Network Puzzles with Mathematics - Part 1

Solving AWS Network Puzzles with Mathematics - Part 1

3
Comments
7 min read
Memory Safe or Bust?

Memory Safe or Bust?

12
Comments 3
5 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

Comments
5 min read
A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons

1
Comments 1
10 min read
Loop DOS? Letƛ Discuss.

Loop DOS? Letƛ Discuss.

Comments
2 min read
Securing the Cloud #25

Securing the Cloud #25

Comments
4 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Introduction to Cryptography in Python

Introduction to Cryptography in Python

Comments
2 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

10
Comments 1
3 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

1
Comments
7 min read
Mastering JWT Security

Mastering JWT Security

84
Comments 18
3 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

8
Comments
11 min read
loading...