DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HackTheBox Headles Walkthrough

HackTheBox Headles Walkthrough

Comments
3 min read
7 Best Practices for Security When Working With Node.js

7 Best Practices for Security When Working With Node.js

Comments
5 min read
Agentic testing for prompt leakage security

Agentic testing for prompt leakage security

46
Comments
8 min read
Heartbleed: The Bug That Shook the Internet

Heartbleed: The Bug That Shook the Internet

Comments
3 min read
How Cloud-Based Solutions Enhance Data Security and Scalability for Enterprises

How Cloud-Based Solutions Enhance Data Security and Scalability for Enterprises

Comments
7 min read
Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

Beyond Docker - A DevOps Engineer's Guide to Container Alternatives

40
Comments
4 min read
Security news weekly round-up - 6th December 2024

Security news weekly round-up - 6th December 2024

Comments
5 min read
API Keys y Variables de Entorno en Astro: Guía Completa de Seguridad

API Keys y Variables de Entorno en Astro: Guía Completa de Seguridad

Comments
3 min read
Top 5 Compiler Flags to Prevent Stack-Based Attacks

Top 5 Compiler Flags to Prevent Stack-Based Attacks

Comments
4 min read
Authentication and Authorization in Django: Django session

Authentication and Authorization in Django: Django session

Comments
5 min read
Remote Code Execution (RCE) in Laravel: Prevention & Example

Remote Code Execution (RCE) in Laravel: Prevention & Example

1
Comments
3 min read
Azure Locks: A Comprehensive Guide

Azure Locks: A Comprehensive Guide

Comments
2 min read
Security-First Architecture in Azure Logic Apps: Patterns, Practices, and Compliance

Security-First Architecture in Azure Logic Apps: Patterns, Practices, and Compliance

Comments
4 min read
Formal Verification: Bridging Theory and Practice

Formal Verification: Bridging Theory and Practice

Comments
3 min read
Strengthening Your Cloud Security with AWS Security & Identity Tools

Strengthening Your Cloud Security with AWS Security & Identity Tools

Comments
3 min read
OAuth2 Authorization Code Grant Type: A Deep Dive

OAuth2 Authorization Code Grant Type: A Deep Dive

Comments
3 min read
12 Essential Tips for API Security — Every Backend Developer Must Know.

12 Essential Tips for API Security — Every Backend Developer Must Know.

Comments
1 min read
Launching My Landing Page on AWS with SSL (from local environment to live)

Launching My Landing Page on AWS with SSL (from local environment to live)

2
Comments
3 min read
DevOps and Security: How To Build Resilient Pipelines

DevOps and Security: How To Build Resilient Pipelines

Comments
6 min read
Reset Password Windows Using Linux

Reset Password Windows Using Linux

Comments
2 min read
Segurança de servidores remotos

Segurança de servidores remotos

Comments
1 min read
DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

DevOpsDays Chattanooga 2024: Learning, Laughter, and Innovation

Comments
6 min read
API Authentication: Part II. API Keys

API Authentication: Part II. API Keys

Comments
15 min read
Should you STOP using VPN for Security ?

Should you STOP using VPN for Security ?

17
Comments
1 min read
Securing Spring Microservice with OAuth 2.0

Securing Spring Microservice with OAuth 2.0

Comments
4 min read
Password Hashing in Python

Password Hashing in Python

Comments 1
1 min read
Fix Security Misconfigurations in Laravel for Safer Web Apps

Fix Security Misconfigurations in Laravel for Safer Web Apps

Comments
3 min read
Context-menu-Lock

Context-menu-Lock

Comments
1 min read
AI Chatbots: Boon or Security Time Bomb?

AI Chatbots: Boon or Security Time Bomb?

1
Comments
2 min read
🚀 Getting Started with kritisi CLI: An AI-Driven Security Tool for Solidity

🚀 Getting Started with kritisi CLI: An AI-Driven Security Tool for Solidity

Comments
3 min read
Google Cloud MFA: Is Your Organization Ready?

Google Cloud MFA: Is Your Organization Ready?

Comments
1 min read
Formal Verification: The Foundation of Ethereum Smart Contracts

Formal Verification: The Foundation of Ethereum Smart Contracts

Comments
5 min read
Booting an OS from a Preserved .E01 (EWF) Disk Image File Using Arsenal Image Mounter

Booting an OS from a Preserved .E01 (EWF) Disk Image File Using Arsenal Image Mounter

Comments
3 min read
Disk Preservation Using the Forensic Linux "Paladin"

Disk Preservation Using the Forensic Linux "Paladin"

Comments
3 min read
Disk Preservation Using the Forensic Linux "Tsurugi Linux"

Disk Preservation Using the Forensic Linux "Tsurugi Linux"

Comments
3 min read
Disk Preservation Using the Forensic Linux "C.A.IN.E."

Disk Preservation Using the Forensic Linux "C.A.IN.E."

Comments
3 min read
Kubernetes Security Best Practices: Safeguarding Your Cluster and Workloads

Kubernetes Security Best Practices: Safeguarding Your Cluster and Workloads

Comments
3 min read
Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Securing Your Azure Cloud Environment with Application Security Groups (ASGs)

Comments
6 min read
Secure Device Authentication in Python: Introducing the System Hardware ID Generator Script

Secure Device Authentication in Python: Introducing the System Hardware ID Generator Script

Comments
5 min read
Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Comments
5 min read
API Authentication: Part I. Basic Authentication

API Authentication: Part I. Basic Authentication

Comments
11 min read
The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

The Essential Guide to Transport Layer Security (TLS): Protecting Your Online Communications 🔒🌐

Comments
3 min read
How Java Development Services Ensure Robust Security for Enterprise-Level Applications

How Java Development Services Ensure Robust Security for Enterprise-Level Applications

Comments
7 min read
DNS Spoofing: Controlling DNS Requests on the Network

DNS Spoofing: Controlling DNS Requests on the Network

Comments
3 min read
Validação e Sanitização em Aplicações Web

Validação e Sanitização em Aplicações Web

Comments
2 min read
Fundamentos da Segurança em Aplicações Web

Fundamentos da Segurança em Aplicações Web

Comments
2 min read
Forward Proxy vs Reverse Proxy vs Load Balancers

Forward Proxy vs Reverse Proxy vs Load Balancers

91
Comments 2
5 min read
Security Management and Advanced Threat Protection

Security Management and Advanced Threat Protection

Comments
2 min read
How to Secure Your Next.js E-commerce Site with RBAC and Permit.io

How to Secure Your Next.js E-commerce Site with RBAC and Permit.io

9
Comments
15 min read
IT Security Risk Management: A Comprehensive Approach to Safeguarding Digital Assets

IT Security Risk Management: A Comprehensive Approach to Safeguarding Digital Assets

Comments
5 min read
Explore: Why PacketSDK is So Concerned about Privacy

Explore: Why PacketSDK is So Concerned about Privacy

Comments
3 min read
AI and Human Monitoring: The Dynamic Duo Against Thefts

AI and Human Monitoring: The Dynamic Duo Against Thefts

Comments
2 min read
How to Test for Security Vulnerabilities Even If You’re Not a Security Expert

How to Test for Security Vulnerabilities Even If You’re Not a Security Expert

Comments
1 min read
Module 4 AWS Cloud Security: A Comprehensive Overview

Module 4 AWS Cloud Security: A Comprehensive Overview

6
Comments
3 min read
16 Soruda Blockchain Güvenliği Nedir Ve Nasıl Sağlanır? 🔥

16 Soruda Blockchain Güvenliği Nedir Ve Nasıl Sağlanır? 🔥

Comments
7 min read
Network Security, CDN Technologies and Performance Optimization

Network Security, CDN Technologies and Performance Optimization

1
Comments
69 min read
Cerbos: Fine-Grained Access Control in Days NOT Months

Cerbos: Fine-Grained Access Control in Days NOT Months

11
Comments
8 min read
Harnessing the Power of AWS Security Services

Harnessing the Power of AWS Security Services

Comments
2 min read
AI Summit Vancouver 2024: Exploring AI's Role, Risks, and Transformative Power

AI Summit Vancouver 2024: Exploring AI's Role, Risks, and Transformative Power

Comments
7 min read
Building a SSL Certificate Monitor (to check a validity date)

Building a SSL Certificate Monitor (to check a validity date)

Comments
2 min read
loading...