DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Vulnerabilities in Guilded.gg

Vulnerabilities in Guilded.gg

4
Comments
5 min read
Face Recognition API: Luxand.cloud vs Microsoft Azure Face API

Face Recognition API: Luxand.cloud vs Microsoft Azure Face API

1
Comments
1 min read
🚀 DevSecOps ⚙️: "A Deep Dive into Scanning External Docker Images with Aqua Trivy in Amazon CodePipeline" 💭

🚀 DevSecOps ⚙️: "A Deep Dive into Scanning External Docker Images with Aqua Trivy in Amazon CodePipeline" 💭

13
Comments
6 min read
Optimise Sign-In Experience. Free Ebook [Get PDF]

Optimise Sign-In Experience. Free Ebook [Get PDF]

Comments
2 min read
Securing IoT devices from DNS-based attacks

Securing IoT devices from DNS-based attacks

2
Comments
7 min read
More secure Vue & Nuxt apps -> by default! 🛡️

More secure Vue & Nuxt apps -> by default! 🛡️

20
Comments 1
4 min read
Basics of Deployment 03: 6 Best Practices for Security

Basics of Deployment 03: 6 Best Practices for Security

1
Comments
4 min read
Secure Your Data: Understand and Manage Authorization Scopes in Google Apps Scripts

Secure Your Data: Understand and Manage Authorization Scopes in Google Apps Scripts

Comments
4 min read
What is the Internet Control Message Protocol (ICMP)

What is the Internet Control Message Protocol (ICMP)

Comments
6 min read
Audit Vigilance: Lighting the Way for Audit Analysis - Unleashing the Bat Computer

Audit Vigilance: Lighting the Way for Audit Analysis - Unleashing the Bat Computer

9
Comments
3 min read
What is DNS Security? How Does it Work?

What is DNS Security? How Does it Work?

1
Comments 2
6 min read
How Reddit Built Authorization with OPA

How Reddit Built Authorization with OPA

6
Comments
13 min read
Ephemeral CI environments using ttl.sh and Gitness

Ephemeral CI environments using ttl.sh and Gitness

1
Comments
4 min read
Você já conhece o Digestabot?

Você já conhece o Digestabot?

3
Comments
2 min read
Authorization Basics

Authorization Basics

Comments
8 min read
Geo-Distributed Face Template Storage in Face Recognition API

Geo-Distributed Face Template Storage in Face Recognition API

1
Comments
2 min read
Enhance Security and Defeat Spoofing: A Comprehensive Guide to Liveness Detection Implementation

Enhance Security and Defeat Spoofing: A Comprehensive Guide to Liveness Detection Implementation

1
Comments
2 min read
Secure Web Authentication with a Serverless API: A Quick Guide

Secure Web Authentication with a Serverless API: A Quick Guide

14
Comments 1
6 min read
The Ultimate Guide to Securing Virtual Machines

The Ultimate Guide to Securing Virtual Machines

1
Comments
5 min read
AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

1
Comments
5 min read
👮🛡️ Let's Navigate the Angular Playground with Route Guards

👮🛡️ Let's Navigate the Angular Playground with Route Guards

1
Comments
2 min read
How to secure a WordPress website in under 1 minute using a simple trick?

How to secure a WordPress website in under 1 minute using a simple trick?

2
Comments 2
2 min read
Demystifying Blockchain Technology

Demystifying Blockchain Technology

14
Comments 7
6 min read
How to Do Authorization - A Decision Framework: Part 1

How to Do Authorization - A Decision Framework: Part 1

62
Comments
7 min read
REST API - Basic components of Authorization and Authentication

REST API - Basic components of Authorization and Authentication

Comments
2 min read
The broken spaceship Honeypot updates

The broken spaceship Honeypot updates

3
Comments
1 min read
AWS Well-Architected Review in Action

AWS Well-Architected Review in Action

15
Comments 1
4 min read
Application Security 101

Application Security 101

6
Comments 2
3 min read
Common Security Vulnerabilities in Dockerfiles

Common Security Vulnerabilities in Dockerfiles

Comments
3 min read
Open redirect vulnerabilities in Rails apps

Open redirect vulnerabilities in Rails apps

Comments
2 min read
Umbraco, Security and Headers

Umbraco, Security and Headers

2
Comments
2 min read
Launching Your Career in Cybersecurity: Insights and Strategies for Success

Launching Your Career in Cybersecurity: Insights and Strategies for Success

1
Comments
3 min read
Essential guide to WebSocket authentication

Essential guide to WebSocket authentication

8
Comments
9 min read
Fortify Your Code: How the NSA's Push for Memory-Safe Languages Can Revolutionize Cybersecurity

Fortify Your Code: How the NSA's Push for Memory-Safe Languages Can Revolutionize Cybersecurity

Comments
2 min read
Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

11
Comments
8 min read
Welcome to modern web

Welcome to modern web

Comments
4 min read
Hardening Cluster Security in Google Kubernetes Engine

Hardening Cluster Security in Google Kubernetes Engine

11
Comments
6 min read
Swift and Strategic Response: Dealing with Exposed IAM Access Keys

Swift and Strategic Response: Dealing with Exposed IAM Access Keys

2
Comments
3 min read
Providing storage for the IT department testing and training

Providing storage for the IT department testing and training

Comments
3 min read
Authentication vs Authorization: Exploring The Difference

Authentication vs Authorization: Exploring The Difference

10
Comments
5 min read
HTB University CTF 2023 Rev Writeups

HTB University CTF 2023 Rev Writeups

2
Comments
6 min read
Embracing the AI and Cybersecurity Evolution: Lessons from Tech Conferences

Embracing the AI and Cybersecurity Evolution: Lessons from Tech Conferences

2
Comments 1
2 min read
Coding and testing as related to Blockchain security

Coding and testing as related to Blockchain security

Comments 2
3 min read
Intro to Blockchain Security

Intro to Blockchain Security

Comments
3 min read
GitTrust (GT): Enhanced S/MIME Commit Signing with Device Authentication

GitTrust (GT): Enhanced S/MIME Commit Signing with Device Authentication

Comments
1 min read
Analyzing a Linux malware binary

Analyzing a Linux malware binary

26
Comments 5
4 min read
Mastering File Upload Security: Understanding File Types

Mastering File Upload Security: Understanding File Types

57
Comments 1
8 min read
Learn Security Best Practices with Sls-mentor latest Security Package

Learn Security Best Practices with Sls-mentor latest Security Package

Comments
2 min read
Pieces’ SOC 2 Journey: Critical Compliance for AI Developer Tools

Pieces’ SOC 2 Journey: Critical Compliance for AI Developer Tools

Comments
8 min read
Using IAM authentication for Redis on AWS

Using IAM authentication for Redis on AWS

5
Comments
5 min read
Security 101 - Phishing

Security 101 - Phishing

1
Comments
2 min read
The Top 10 AWS EC2 Security Risks: What You Need to Know

The Top 10 AWS EC2 Security Risks: What You Need to Know

Comments
2 min read
How does machine to machine authentication work?

How does machine to machine authentication work?

9
Comments
11 min read
Implantando e conectando-se a uma Instância EC2 usando AWS System Manager e Terraform.

Implantando e conectando-se a uma Instância EC2 usando AWS System Manager e Terraform.

2
Comments
5 min read
🚀 Top 12 Open Source Auth Projects Every Developer Should Know 🔑

🚀 Top 12 Open Source Auth Projects Every Developer Should Know 🔑

3
Comments
9 min read
Combining 2FA and Public Key Authentication for a better Linux SSH security

Combining 2FA and Public Key Authentication for a better Linux SSH security

8
Comments
6 min read
Cloud Pentest 101

Cloud Pentest 101

35
Comments
2 min read
TechBash: Automation, Security and Development Best Practices In The Poconos

TechBash: Automation, Security and Development Best Practices In The Poconos

7
Comments
9 min read
How security and privacy impacts the database design

How security and privacy impacts the database design

6
Comments 2
7 min read
What is a Slowloris Attack | How Does a Slowloris Attack Work?

What is a Slowloris Attack | How Does a Slowloris Attack Work?

1
Comments
5 min read
loading...