DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is SAML And Why You Should Care

What is SAML And Why You Should Care

16
Comments
7 min read
Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

10
Comments
9 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
AWS Config para análisis de seguridad

AWS Config para análisis de seguridad

Comments
1 min read
Top Secrets Management Tools for 2024

Top Secrets Management Tools for 2024

4
Comments 1
10 min read
DevSecOps MythBuster – “Git Clone and DevOps Backup Script is all I need for data protection”

DevSecOps MythBuster – “Git Clone and DevOps Backup Script is all I need for data protection”

Comments
4 min read
Essential Steps for Securing Your AWS Environment

Essential Steps for Securing Your AWS Environment

1
Comments 1
9 min read
Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

3
Comments
6 min read
Voice OTPs: Pioneering a New Era in Authentication Security

Voice OTPs: Pioneering a New Era in Authentication Security

Comments
4 min read
Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Comments
5 min read
Understand OAuth 2.0 code grant flow 🔐

Understand OAuth 2.0 code grant flow 🔐

12
Comments 1
5 min read
Double Down on Security: IAM MFA in AWS

Double Down on Security: IAM MFA in AWS

Comments
2 min read
Deploy SPFx app using pipeline's Workload Identity federation

Deploy SPFx app using pipeline's Workload Identity federation

Comments
4 min read
How to secure tenant payment methods?

How to secure tenant payment methods?

Comments 1
1 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
A Passwordless Future: Passkeys for Developers

A Passwordless Future: Passkeys for Developers

11
Comments
11 min read
Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Comments 3
6 min read
Secure Browser Access to code-server VSCode

Secure Browser Access to code-server VSCode

6
Comments 1
4 min read
AWS VPC Endpoint is NOT a security topic!?

AWS VPC Endpoint is NOT a security topic!?

7
Comments
3 min read
Quick guide to applying MuleSoft's API Autodiscovery

Quick guide to applying MuleSoft's API Autodiscovery

2
Comments
2 min read
Passwordless Authentication is the future !?

Passwordless Authentication is the future !?

Comments
3 min read
Securing API Keys in SwiftUI: A Practical Guide (Intro)

Securing API Keys in SwiftUI: A Practical Guide (Intro)

26
Comments
5 min read
ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis

ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis

1
Comments
4 min read
EBS, seus snapshots e quanto ocupam de espaço

EBS, seus snapshots e quanto ocupam de espaço

3
Comments
5 min read
What are some fun or scary vulnerabilities you heard about recently??

What are some fun or scary vulnerabilities you heard about recently??

7
Comments 2
1 min read
Fortifying Your Digital Presence: The Significance of Mobile App Security

Fortifying Your Digital Presence: The Significance of Mobile App Security

Comments
6 min read
Level up your vulnerability management skills . . . painlessly

Level up your vulnerability management skills . . . painlessly

2
Comments
1 min read
How to Set Up Runtime Monitoring ECS Cluster Using GuardDuty

How to Set Up Runtime Monitoring ECS Cluster Using GuardDuty

3
Comments
6 min read
AI TRiSM - Building trust in artificial intelligence

AI TRiSM - Building trust in artificial intelligence

1
Comments
3 min read
Securing your automation: A guide to ensuring Ansible Playbook security

Securing your automation: A guide to ensuring Ansible Playbook security

Comments
7 min read
Top Monitoring and Logging Tools: The Guardians of Digital Performance

Top Monitoring and Logging Tools: The Guardians of Digital Performance

Comments
2 min read
Secret values in Scala

Secret values in Scala

Comments 1
5 min read
Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

1
Comments
3 min read
Permission not granted - on failing to create cross-profile app pairs

Permission not granted - on failing to create cross-profile app pairs

Comments
5 min read
INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
Banana Decryption: Unpacking Caesar Cipher with Power Automate

Banana Decryption: Unpacking Caesar Cipher with Power Automate

8
Comments
1 min read
Working with Streams in Node.js

Working with Streams in Node.js

Comments
2 min read
Quick guide to secure/encrypt your properties in MuleSoft

Quick guide to secure/encrypt your properties in MuleSoft

1
Comments
1 min read
Approval Phishing Scams See Explosive Boost, With $347 Million Stolen in 2023 – Chainalysis

Approval Phishing Scams See Explosive Boost, With $347 Million Stolen in 2023 – Chainalysis

6
Comments
4 min read
Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

2
Comments
2 min read
IOT security

IOT security

Comments
2 min read
JavaScript Objects and its secret associates: Prototype

JavaScript Objects and its secret associates: Prototype

2
Comments
3 min read
What is Information Security Threats

What is Information Security Threats

Comments
2 min read
Shielding Your Kubernetes Network: Mastering iptables for Enhanced Security

Shielding Your Kubernetes Network: Mastering iptables for Enhanced Security

13
Comments
22 min read
The CORS Conundrum

The CORS Conundrum

7
Comments
8 min read
Secure Litestar APIs with OKTA

Secure Litestar APIs with OKTA

4
Comments
3 min read
What is a private key

What is a private key

Comments
5 min read
Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

Sloan's Inbox: Any advice for a web dev who is considering a career in cybersecurity?

7
Comments 4
1 min read
Linux Special Permissions: A Comprehensive Guide with Examples

Linux Special Permissions: A Comprehensive Guide with Examples

6
Comments
3 min read
Linux Access Control Lists (ACLs): A Simplified Guide with Examples

Linux Access Control Lists (ACLs): A Simplified Guide with Examples

4
Comments
2 min read
How can I secure a NestJS & Firebase API?

How can I secure a NestJS & Firebase API?

1
Comments 1
1 min read
Security in FastAPI: Best practices to protect your application (Part I)

Security in FastAPI: Best practices to protect your application (Part I)

3
Comments
4 min read
JWT vs Session Authentication

JWT vs Session Authentication

224
Comments 25
3 min read
How to remove your personal info from Google

How to remove your personal info from Google

3
Comments 2
3 min read
Understanding Ethernet and Fiber Op

Understanding Ethernet and Fiber Op

1
Comments
3 min read
Creating stronger passwords with AuthKit

Creating stronger passwords with AuthKit

5
Comments
7 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
What's New With AWS Security? | January Edition

What's New With AWS Security? | January Edition

Comments
3 min read
Authorization and Authentication in Django

Authorization and Authentication in Django

1
Comments
2 min read
How to Host Static Webpage-CloudFront with S3 (part1)

How to Host Static Webpage-CloudFront with S3 (part1)

3
Comments
4 min read
loading...