DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
5 Future Trends in API Development: A Glimpse into 2024

5 Future Trends in API Development: A Glimpse into 2024

5
Comments
5 min read
Security - A brief introduction to application security

Security - A brief introduction to application security

5
Comments
2 min read
Mastering Cloud Security Posture Management

Mastering Cloud Security Posture Management

Comments
3 min read
EC2: Parches automáticos para liberar tu agenda

EC2: Parches automáticos para liberar tu agenda

12
Comments
7 min read
What is Infrastructure Security?

What is Infrastructure Security?

4
Comments 4
7 min read
How to install Kali Linux in 2024 also my thoughts on CyberSecurity, Penetration testing

How to install Kali Linux in 2024 also my thoughts on CyberSecurity, Penetration testing

Comments
1 min read
Encrypted Remote Terraform State with Postgres and LUKS

Encrypted Remote Terraform State with Postgres and LUKS

2
Comments 1
10 min read
Como proteger a sua aplicação web na AWS usando WAF (Web Application Firewall)

Como proteger a sua aplicação web na AWS usando WAF (Web Application Firewall)

Comments
1 min read
The Reluctant Software Developer: Contributing to HashiCorp Vault

The Reluctant Software Developer: Contributing to HashiCorp Vault

1
Comments
7 min read
Discover DbVisualizer Security Features for MySQL

Discover DbVisualizer Security Features for MySQL

Comments
7 min read
VPN kill switch: how to do it on Linux

VPN kill switch: how to do it on Linux

1
Comments
7 min read
Elevate Your AWS Security: An in-Depth look at AWS Inspector

Elevate Your AWS Security: An in-Depth look at AWS Inspector

Comments
5 min read
My checklist for a production-ready website

My checklist for a production-ready website

22
Comments 1
9 min read
6 Best Practices for Securing Your AI Apps by API Gateway

6 Best Practices for Securing Your AI Apps by API Gateway

11
Comments
2 min read
Securing Your App: TOTP Authentication with Spring Boot and Angular — Part One — Overview & Project Setup

Securing Your App: TOTP Authentication with Spring Boot and Angular — Part One — Overview & Project Setup

1
Comments
4 min read
Securing Your App: TOTP Authentication with Spring Boot and Angular — Part Two— Implementation & Demo

Securing Your App: TOTP Authentication with Spring Boot and Angular — Part Two— Implementation & Demo

4
Comments
4 min read
Web App Warrior: Defense Strategies for Modern Threats

Web App Warrior: Defense Strategies for Modern Threats

Comments
10 min read
Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

1
Comments
2 min read
What is Rego and how do you use it?

What is Rego and how do you use it?

Comments
1 min read
Customize Cognito Access Token with Rust

Customize Cognito Access Token with Rust

5
Comments
6 min read
Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

20
Comments 2
9 min read
Kubernetes Security: A Step Towards a Secure Direction

Kubernetes Security: A Step Towards a Secure Direction

Comments
2 min read
New Preview of Azure DevOps Best Practice analyzer released

New Preview of Azure DevOps Best Practice analyzer released

Comments
1 min read
Beginners to Pro Engineering: Load-balancing for cyber security

Beginners to Pro Engineering: Load-balancing for cyber security

Comments
1 min read
What is Security and the AWS Shared Responsibility Model

What is Security and the AWS Shared Responsibility Model

Comments
2 min read
Predictions for the future of cloud computing – 2023 edition

Predictions for the future of cloud computing – 2023 edition

4
Comments
5 min read
Unraveling Cloud Security Secrets

Unraveling Cloud Security Secrets

Comments
2 min read
How to Avoid Facial Recognition

How to Avoid Facial Recognition

1
Comments
2 min read
9 Types of Application Security Testing Tools

9 Types of Application Security Testing Tools

1
Comments
3 min read
Spring Boot 3.1 JWT Authentication &Authorization: Secure Your APIs Like a Prođź”’

Spring Boot 3.1 JWT Authentication &Authorization: Secure Your APIs Like a Prođź”’

5
Comments 4
5 min read
Evitando SQL Injection com Golang

Evitando SQL Injection com Golang

35
Comments 2
9 min read
Authentication is Not Enough: Here's Your Auth Roadmap for 2024

Authentication is Not Enough: Here's Your Auth Roadmap for 2024

6
Comments
8 min read
Terrapin attack on SSH: what do you need to know

Terrapin attack on SSH: what do you need to know

1
Comments
4 min read
Requirements for a scalable Authorization Architecture

Requirements for a scalable Authorization Architecture

Comments
12 min read
Do you already know Digestabot?

Do you already know Digestabot?

1
Comments
2 min read
Guidelines to Secure AI from Design to Maintenance

Guidelines to Secure AI from Design to Maintenance

Comments
6 min read
Securing Your AWS Infrastructure: VPCs, Security Groups, and NACLs

Securing Your AWS Infrastructure: VPCs, Security Groups, and NACLs

7
Comments
3 min read
Usei o Android sem apps Google por dois meses 📱

Usei o Android sem apps Google por dois meses 📱

6
Comments
4 min read
HackTheBox - Writeup Authority [Retired]

HackTheBox - Writeup Authority [Retired]

Comments
16 min read
Evolutive and robust password hashing using PBKDF2 in .NET

Evolutive and robust password hashing using PBKDF2 in .NET

Comments
9 min read
AI, cybersecurity and energy efficiency

AI, cybersecurity and energy efficiency

Comments
1 min read
AI 2.0: The Evolution of the Open Source Movement

AI 2.0: The Evolution of the Open Source Movement

Comments
2 min read
Computer Network Notes

Computer Network Notes

5
Comments
1 min read
MongoDB giving user permission to view only single collection.

MongoDB giving user permission to view only single collection.

1
Comments
2 min read
Advanced Encryption Standard with Swift

Advanced Encryption Standard with Swift

Comments
1 min read
Checkout Last week top 5 posts tagged(#security)

Checkout Last week top 5 posts tagged(#security)

1
Comments 1
1 min read
Is JWT really a good fit for authentication?

Is JWT really a good fit for authentication?

23
Comments 22
4 min read
#Les 10 Menaces Informatiques les Plus Redoutables de 2023

#Les 10 Menaces Informatiques les Plus Redoutables de 2023

Comments
8 min read
hack.chat

hack.chat

4
Comments 5
1 min read
What's New With AWS Security? | December Edition

What's New With AWS Security? | December Edition

1
Comments 2
6 min read
RSA Keygen and Management

RSA Keygen and Management

Comments
2 min read
What’s the Deal with CVEs?

What’s the Deal with CVEs?

1
Comments
6 min read
AWS IAM - Security practices you should consider [100]

AWS IAM - Security practices you should consider [100]

Comments
2 min read
Choosing the right AWS solution: Comparing AWS European Sovereign Cloud against other offerings

Choosing the right AWS solution: Comparing AWS European Sovereign Cloud against other offerings

17
Comments
6 min read
Pensando sobre Cultura de AppSec

Pensando sobre Cultura de AppSec

8
Comments 1
3 min read
Container Monitoring in Pulsar 0.7.0

Container Monitoring in Pulsar 0.7.0

Comments
4 min read
The Impact of AI on Writing Code

The Impact of AI on Writing Code

1
Comments
2 min read
Microservices DevSecOps: Best Security Practices

Microservices DevSecOps: Best Security Practices

Comments
3 min read
DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

1
Comments
4 min read
Vulnerabilities in Guilded.gg

Vulnerabilities in Guilded.gg

4
Comments
5 min read
loading...