DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Reluctant Software Developer: Contributing to HashiCorp Vault

The Reluctant Software Developer: Contributing to HashiCorp Vault

1
Comments
7 min read
Discover DbVisualizer Security Features for MySQL

Discover DbVisualizer Security Features for MySQL

Comments
7 min read
VPN kill switch: how to do it on Linux

VPN kill switch: how to do it on Linux

1
Comments
7 min read
Elevate Your AWS Security: An in-Depth look at AWS Inspector

Elevate Your AWS Security: An in-Depth look at AWS Inspector

Comments
5 min read
My checklist for a production-ready website

My checklist for a production-ready website

22
Comments 1
9 min read
6 Best Practices for Securing Your AI Apps by API Gateway

6 Best Practices for Securing Your AI Apps by API Gateway

11
Comments
2 min read
Securing Your App: TOTP Authentication with Spring Boot and Angular — Part One — Overview & Project Setup

Securing Your App: TOTP Authentication with Spring Boot and Angular — Part One — Overview & Project Setup

1
Comments
4 min read
Securing Your App: TOTP Authentication with Spring Boot and Angular — Part Two— Implementation & Demo

Securing Your App: TOTP Authentication with Spring Boot and Angular — Part Two— Implementation & Demo

4
Comments
4 min read
Web App Warrior: Defense Strategies for Modern Threats

Web App Warrior: Defense Strategies for Modern Threats

Comments
10 min read
Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

Lifeguard to Cybersecurity Guru: Embracing the Unexpected in Tech

1
Comments
2 min read
What is Rego and how do you use it?

What is Rego and how do you use it?

Comments
1 min read
Customize Cognito Access Token with Rust

Customize Cognito Access Token with Rust

5
Comments
6 min read
Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

23
Comments 2
9 min read
Kubernetes Security: A Step Towards a Secure Direction

Kubernetes Security: A Step Towards a Secure Direction

Comments
2 min read
New Preview of Azure DevOps Best Practice analyzer released

New Preview of Azure DevOps Best Practice analyzer released

Comments
1 min read
Beginners to Pro Engineering: Load-balancing for cyber security

Beginners to Pro Engineering: Load-balancing for cyber security

Comments
1 min read
What is Security and the AWS Shared Responsibility Model

What is Security and the AWS Shared Responsibility Model

Comments
2 min read
Predictions for the future of cloud computing – 2023 edition

Predictions for the future of cloud computing – 2023 edition

4
Comments
5 min read
Unraveling Cloud Security Secrets

Unraveling Cloud Security Secrets

Comments
2 min read
How to Avoid Facial Recognition

How to Avoid Facial Recognition

1
Comments
2 min read
9 Types of Application Security Testing Tools

9 Types of Application Security Testing Tools

1
Comments
3 min read
Spring Boot 3.1 JWT Authentication &Authorization: Secure Your APIs Like a Pro🔒

Spring Boot 3.1 JWT Authentication &Authorization: Secure Your APIs Like a Pro🔒

5
Comments 4
5 min read
Evitando SQL Injection com Golang

Evitando SQL Injection com Golang

35
Comments 2
9 min read
Authentication is Not Enough: Here's Your Auth Roadmap for 2024

Authentication is Not Enough: Here's Your Auth Roadmap for 2024

6
Comments
8 min read
Terrapin attack on SSH: what do you need to know

Terrapin attack on SSH: what do you need to know

1
Comments
4 min read
Requirements for a scalable Authorization Architecture

Requirements for a scalable Authorization Architecture

Comments
12 min read
Do you already know Digestabot?

Do you already know Digestabot?

1
Comments
2 min read
Guidelines to Secure AI from Design to Maintenance

Guidelines to Secure AI from Design to Maintenance

Comments
6 min read
Securing Your AWS Infrastructure: VPCs, Security Groups, and NACLs

Securing Your AWS Infrastructure: VPCs, Security Groups, and NACLs

7
Comments
3 min read
Usei o Android sem apps Google por dois meses 📱

Usei o Android sem apps Google por dois meses 📱

6
Comments
4 min read
HackTheBox - Writeup Authority [Retired]

HackTheBox - Writeup Authority [Retired]

Comments
16 min read
Evolutive and robust password hashing using PBKDF2 in .NET

Evolutive and robust password hashing using PBKDF2 in .NET

Comments
9 min read
AI, cybersecurity and energy efficiency

AI, cybersecurity and energy efficiency

Comments
1 min read
AI 2.0: The Evolution of the Open Source Movement

AI 2.0: The Evolution of the Open Source Movement

Comments
2 min read
Computer Network Notes

Computer Network Notes

5
Comments
1 min read
MongoDB giving user permission to view only single collection.

MongoDB giving user permission to view only single collection.

1
Comments
2 min read
Advanced Encryption Standard with Swift

Advanced Encryption Standard with Swift

Comments
1 min read
Checkout Last week top 5 posts tagged(#security)

Checkout Last week top 5 posts tagged(#security)

1
Comments 1
1 min read
Is JWT really a good fit for authentication?

Is JWT really a good fit for authentication?

23
Comments 22
4 min read
#Les 10 Menaces Informatiques les Plus Redoutables de 2023

#Les 10 Menaces Informatiques les Plus Redoutables de 2023

Comments
8 min read
hack.chat

hack.chat

4
Comments 5
1 min read
What's New With AWS Security? | December Edition

What's New With AWS Security? | December Edition

1
Comments 2
6 min read
RSA Keygen and Management

RSA Keygen and Management

Comments
2 min read
What’s the Deal with CVEs?

What’s the Deal with CVEs?

1
Comments
6 min read
AWS IAM - Security practices you should consider [100]

AWS IAM - Security practices you should consider [100]

Comments
2 min read
Choosing the right AWS solution: Comparing AWS European Sovereign Cloud against other offerings

Choosing the right AWS solution: Comparing AWS European Sovereign Cloud against other offerings

17
Comments
6 min read
Pensando sobre Cultura de AppSec

Pensando sobre Cultura de AppSec

8
Comments 1
3 min read
Container Monitoring in Pulsar 0.7.0

Container Monitoring in Pulsar 0.7.0

Comments
4 min read
The Impact of AI on Writing Code

The Impact of AI on Writing Code

1
Comments
2 min read
Microservices DevSecOps: Best Security Practices

Microservices DevSecOps: Best Security Practices

1
Comments
3 min read
DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

1
Comments
4 min read
Vulnerabilities in Guilded.gg

Vulnerabilities in Guilded.gg

4
Comments
5 min read
Face Recognition API: Luxand.cloud vs Microsoft Azure Face API

Face Recognition API: Luxand.cloud vs Microsoft Azure Face API

1
Comments
1 min read
🚀 DevSecOps ⚙️: "A Deep Dive into Scanning External Docker Images with Aqua Trivy in Amazon CodePipeline" 💭

🚀 DevSecOps ⚙️: "A Deep Dive into Scanning External Docker Images with Aqua Trivy in Amazon CodePipeline" 💭

14
Comments
6 min read
Optimise Sign-In Experience. Free Ebook [Get PDF]

Optimise Sign-In Experience. Free Ebook [Get PDF]

Comments
2 min read
Securing IoT devices from DNS-based attacks

Securing IoT devices from DNS-based attacks

2
Comments
7 min read
More secure Vue & Nuxt apps -> by default! 🛡️

More secure Vue & Nuxt apps -> by default! 🛡️

20
Comments 1
4 min read
Basics of Deployment 03: 6 Best Practices for Security

Basics of Deployment 03: 6 Best Practices for Security

1
Comments
4 min read
Secure Your Data: Understand and Manage Authorization Scopes in Google Apps Scripts

Secure Your Data: Understand and Manage Authorization Scopes in Google Apps Scripts

Comments
4 min read
What is the Internet Control Message Protocol (ICMP)

What is the Internet Control Message Protocol (ICMP)

Comments
6 min read
loading...