DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Authorization and Authentication in Django

Authorization and Authentication in Django

1
Comments
2 min read
How to Host Static Webpage-CloudFront with S3 (part1)

How to Host Static Webpage-CloudFront with S3 (part1)

3
Comments
4 min read
My Developer Nightmare

My Developer Nightmare

10
Comments
3 min read
Is Using Firebase on Client-Side Safe? đź”’

Is Using Firebase on Client-Side Safe? đź”’

7
Comments
3 min read
Microsoft Entra ID

Microsoft Entra ID

Comments
1 min read
Azure Monitor Parte 2: Dicas para Garantir a Segurança de VMs no Azure

Azure Monitor Parte 2: Dicas para Garantir a Segurança de VMs no Azure

1
Comments
3 min read
Enhancing Security: Passport.Js

Enhancing Security: Passport.Js

1
Comments
3 min read
How to protect sensitive information in SharePoint Online using Purview Sensitivity Labels

How to protect sensitive information in SharePoint Online using Purview Sensitivity Labels

3
Comments
11 min read
How to Do Authorization - A Decision Framework: Part 2

How to Do Authorization - A Decision Framework: Part 2

25
Comments
5 min read
Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Comments
5 min read
JWT can fit as an authentication system with a blacklist technique

JWT can fit as an authentication system with a blacklist technique

5
Comments 11
3 min read
Elastic Search 8.x : ELK Setup over TLS/SSL

Elastic Search 8.x : ELK Setup over TLS/SSL

1
Comments
13 min read
Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Working To Eliminate Hardcoded Secrets? Coordinating and Prioritizing Remediation With The GitGuardian Platform

Comments
9 min read
DIY Home Security Camera System

DIY Home Security Camera System

114
Comments 6
8 min read
Banana encryption: Decoding Caesar Cipher with Power Automate

Banana encryption: Decoding Caesar Cipher with Power Automate

12
Comments 4
2 min read
Introduction to Web Application Security

Introduction to Web Application Security

4
Comments 2
3 min read
Security Logger

Security Logger

Comments
2 min read
Odoo security concept

Odoo security concept

3
Comments 4
7 min read
AWS Locksmith: Encrypting S3 and EBS with Amazon KMS

AWS Locksmith: Encrypting S3 and EBS with Amazon KMS

5
Comments 2
4 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Navigating the Cloud: Unveiling the Best Lifetime Plans for Cloud Storage

Navigating the Cloud: Unveiling the Best Lifetime Plans for Cloud Storage

Comments
4 min read
This is a post for newbies to ask for help

This is a post for newbies to ask for help

2
Comments 3
1 min read
Best Practices in API Key Management and Utilization

Best Practices in API Key Management and Utilization

2
Comments
3 min read
Serverless Technology: Static to Dynamic

Serverless Technology: Static to Dynamic

Comments
3 min read
How to Setup CloudFront with S3 bucket for Presigned URLs

How to Setup CloudFront with S3 bucket for Presigned URLs

3
Comments
4 min read
How to Improve Your Website Security in 2024

How to Improve Your Website Security in 2024

2
Comments
5 min read
Azure Firewall

Azure Firewall

1
Comments
4 min read
Why is Web App and API Security Testing So Critical?

Why is Web App and API Security Testing So Critical?

Comments
4 min read
Getting Started with DevSecOps: An Introduction to CNAPP

Getting Started with DevSecOps: An Introduction to CNAPP

4
Comments
6 min read
Learning GitHub Actions in a Simple Way

Learning GitHub Actions in a Simple Way

13
Comments
6 min read
🛡️4 Top Database Security Tools in 2024 🏆🔥

🛡️4 Top Database Security Tools in 2024 🏆🔥

17
Comments 2
3 min read
Top 10 Tips for Password Protection in AWS

Top 10 Tips for Password Protection in AWS

Comments
3 min read
Veracode & AzDevOps: Trabalhando com Task Groups

Veracode & AzDevOps: Trabalhando com Task Groups

2
Comments
2 min read
ÂżEs AWS seguro?

ÂżEs AWS seguro?

6
Comments 1
10 min read
How to Secure Your Network from Hackers?

How to Secure Your Network from Hackers?

5
Comments
4 min read
WordPress: Empowering the Web with User-Friendly CMS and Dynamic Plugin Architecture

WordPress: Empowering the Web with User-Friendly CMS and Dynamic Plugin Architecture

Comments
8 min read
Reverse Shell on MetaSploitable3 Windows

Reverse Shell on MetaSploitable3 Windows

2
Comments
3 min read
Dorking of Google

Dorking of Google

Comments
2 min read
O que vem depois do Pentesting?

O que vem depois do Pentesting?

14
Comments
13 min read
Set Default Sharing to “People with Existing Access” in SharePoint Online

Set Default Sharing to “People with Existing Access” in SharePoint Online

1
Comments
5 min read
IPv4 surcharge — Your AWS bill is going up this February

IPv4 surcharge — Your AWS bill is going up this February

10
Comments 1
5 min read
AWS Well-Architected Review in Action

AWS Well-Architected Review in Action

1
Comments
4 min read
Hardening The Home Lab

Hardening The Home Lab

11
Comments
3 min read
Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Honeytokens For Peace Of Mind: Using Cyber Deception To Buy Time To Remediate At Scale

Comments
3 min read
Secure Development Practices to Safeguard Your Software

Secure Development Practices to Safeguard Your Software

Comments
3 min read
S3 Bucket Takeover Neutralization

S3 Bucket Takeover Neutralization

Comments
4 min read
We removed cookies, pixels, and tags from the website and console

We removed cookies, pixels, and tags from the website and console

2
Comments
8 min read
Security auditing your Linux OS with Lynis

Security auditing your Linux OS with Lynis

10
Comments 1
4 min read
Restrict GitHub branches to specific prefixes

Restrict GitHub branches to specific prefixes

Comments
1 min read
Streamlining Security Management

Streamlining Security Management

3
Comments
5 min read
DruBOM: An SBOM for Drupal

DruBOM: An SBOM for Drupal

5
Comments
3 min read
Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

Understanding the Risks of Long-Lived Kubernetes Service Account Tokens

7
Comments
7 min read
Deploying Containers with Security in mind (Beginner)

Deploying Containers with Security in mind (Beginner)

2
Comments
3 min read
Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

8
Comments 2
17 min read
Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow

Securing Docker Images: A Comprehensive Guide to Integrating Docker Scout in GitHub Workflow

22
Comments 5
6 min read
Should Sensitive Systems Be Open Source ?

Should Sensitive Systems Be Open Source ?

12
Comments 4
6 min read
DevSecOps 101: What is DevSecOps?

DevSecOps 101: What is DevSecOps?

Comments
5 min read
IAM Identity Center com Terraform

IAM Identity Center com Terraform

4
Comments
4 min read
Azure Network Security Groups

Azure Network Security Groups

Comments
4 min read
The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

The Hidden Dangers of Face Embeddings: Unmasking the Privacy Risks

Comments
6 min read
loading...