DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
DruBOM: An SBOM for Drupal

DruBOM: An SBOM for Drupal

5
Comments
3 min read
Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

7
Comments
7 min read
Deploying Containers with Security in mind (Beginner)

Deploying Containers with Security in mind (Beginner)

2
Comments
3 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

8
Comments 2
17 min read
Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow

Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow

22
Comments 5
6 min read
Should Sensitive Systems Be Open Source ?

Should Sensitive Systems Be Open Source ?

12
Comments 4
6 min read
DevSecOps 101: What is DevSecOps?

DevSecOps 101: What is DevSecOps?

Comments
5 min read
IAM Identity Center com Terraform

IAM Identity Center com Terraform

4
Comments
4 min read
Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

Comments
6 min read
Five Ways Your CI/CD Pipeline Can Be Exploited

Five Ways Your CI/CD Pipeline Can Be Exploited

2
Comments
5 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
Re-learning security: Encryption, Encoding, Hashing ☄

Re-learning security: Encryption, Encoding, Hashing ☄

Comments
7 min read
Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

Cybersecurity Alert: The New Phishing Scam Hitting OpenSea Users

1
Comments
2 min read
Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Exploring the Frontiers of Privacy and Security: A Comprehensive Dive into Homomorphic Encryption

Comments
10 min read
Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

Word lists ,Crunch, John and Hash Cat - All Kali Word List Tools Explained.

2
Comments
5 min read
Protect secrets in Git with the clean/smudge filter

Protect secrets in Git with the clean/smudge filter

Comments
4 min read
How to Onboard and Protect Remote Teams with Secure Cloud Environments

How to Onboard and Protect Remote Teams with Secure Cloud Environments

7
Comments 1
5 min read
Cerbos Hub: Simplifying Authorization for Developers

Cerbos Hub: Simplifying Authorization for Developers

Comments
2 min read
Comparison between Data Privacy & Data Security

Comparison between Data Privacy & Data Security

Comments
3 min read
pip-audit: Managing pip Vulnerabilities

pip-audit: Managing pip Vulnerabilities

Comments
2 min read
Preventing Multiple Failed Input Attack using Redis and NodeJS

Preventing Multiple Failed Input Attack using Redis and NodeJS

Comments
4 min read
"Attestation check for Topics failed"

"Attestation check for Topics failed"

2
Comments
1 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

5
Comments
17 min read
Redeemer | HackTheBox Write-up

Redeemer | HackTheBox Write-up

5
Comments
3 min read
Methodology: How we discovered over 18,000 API secret tokens

Methodology: How we discovered over 18,000 API secret tokens

Comments
6 min read
Re-learning security: detecting package vulnerabilities 🎁 NPM and Nuget.

Re-learning security: detecting package vulnerabilities 🎁 NPM and Nuget.

1
Comments
6 min read
Git Security: Best Practices for Keeping Your Code Safe

Git Security: Best Practices for Keeping Your Code Safe

5
Comments
5 min read
How to mitigate ddos attack

How to mitigate ddos attack

Comments
4 min read
A Step-by-Step Guide to Implement JWT Authentication in NestJS using Passport

A Step-by-Step Guide to Implement JWT Authentication in NestJS using Passport

8
Comments
11 min read
Automatically Hash Laravel Model Values Using the "Hashed" Cast

Automatically Hash Laravel Model Values Using the "Hashed" Cast

4
Comments
5 min read
#DeveloperTipOfTheWeek - Application Security

#DeveloperTipOfTheWeek - Application Security

Comments 1
1 min read
Mad Devs’ #20 Newsletter. December 2023

Mad Devs’ #20 Newsletter. December 2023

Comments
4 min read
Unleash the Power of Security with GraphQL Protect: Fortifying Your GraphQL APIs

Unleash the Power of Security with GraphQL Protect: Fortifying Your GraphQL APIs

7
Comments
2 min read
The Best Authentication Methods for Your App (Decision Tree)

The Best Authentication Methods for Your App (Decision Tree)

Comments
1 min read
Patching your Auto Scaling Group on AWS

Patching your Auto Scaling Group on AWS

4
Comments
3 min read
Kicking the tires of Docker Scout

Kicking the tires of Docker Scout

9
Comments 3
3 min read
đŸ€”Quem vai ler o que eu escrevo?

đŸ€”Quem vai ler o que eu escrevo?

1
Comments
1 min read
Geo-restricting AWS Workspaces: Finding out how to cook parsnip soup

Geo-restricting AWS Workspaces: Finding out how to cook parsnip soup

1
Comments
5 min read
AWS networking Tips 🎬 Serie: ⚡ Cloud Superpower ⚡ 2.04

AWS networking Tips 🎬 Serie: ⚡ Cloud Superpower ⚡ 2.04

Comments
4 min read
Empowering Your Digital Security: Why Privacy Enthusiasts Should Embrace Hardware Security Keys

Empowering Your Digital Security: Why Privacy Enthusiasts Should Embrace Hardware Security Keys

Comments
3 min read
Unveiling the Power of Virtual Private Networks (VPNs)

Unveiling the Power of Virtual Private Networks (VPNs)

1
Comments 1
26 min read
Log4j2 in Spring boot

Log4j2 in Spring boot

Comments
2 min read
Understanding AWS Instance Metadata Service: A Closer Look

Understanding AWS Instance Metadata Service: A Closer Look

3
Comments
8 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
How to secure SSH server

How to secure SSH server

1
Comments
1 min read
Rate-limiting API Endpoint using Bucket4j in Spring

Rate-limiting API Endpoint using Bucket4j in Spring

Comments
2 min read
Creating DNS Zone in Azure the easiest way

Creating DNS Zone in Azure the easiest way

Comments
3 min read
Secure CloudSQL Connectivity with Google Cloud SQL Auth Proxy as Systemd

Secure CloudSQL Connectivity with Google Cloud SQL Auth Proxy as Systemd

Comments
3 min read
Getting Familiar with ChatCraft

Getting Familiar with ChatCraft

2
Comments
5 min read
Dealing With GitHub Password Authentication Deprecation

Dealing With GitHub Password Authentication Deprecation

1
Comments
4 min read
How To Use a SOCKS Proxy in Axios

How To Use a SOCKS Proxy in Axios

2
Comments
4 min read
You Can Now Create a Secure DuckDuckGo Email Account

You Can Now Create a Secure DuckDuckGo Email Account

1
Comments
3 min read
The Risks of API Integration and How to Mitigate Them

The Risks of API Integration and How to Mitigate Them

2
Comments
6 min read
Why should you care about the “security.txt” file on your website?

Why should you care about the “security.txt” file on your website?

1
Comments
3 min read
7 formas de adquirir experiĂȘncia em cibersegurança

7 formas de adquirir experiĂȘncia em cibersegurança

11
Comments
6 min read
Administra las credenciales de aplicaciĂłn con [EKS Pod Identity]

Administra las credenciales de aplicaciĂłn con [EKS Pod Identity]

2
Comments
5 min read
Kubernetes Container Policies: Enhancing Security and Efficiency

Kubernetes Container Policies: Enhancing Security and Efficiency

Comments
6 min read
Relationship Based Access Control (ReBAC): When To Use It

Relationship Based Access Control (ReBAC): When To Use It

7
Comments
8 min read
Vulnerability Scanning Solution

Vulnerability Scanning Solution

Comments
3 min read
loading...