DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Audit Vigilance: Lighting the Way for Audit Analysis - Unleashing the Bat Computer

Audit Vigilance: Lighting the Way for Audit Analysis - Unleashing the Bat Computer

9
Comments
3 min read
How Reddit Built Authorization with OPA

How Reddit Built Authorization with OPA

6
Comments
13 min read
What is DNS Security? How Does it Work?

What is DNS Security? How Does it Work?

1
Comments 2
6 min read
Ephemeral CI environments using ttl.sh and Gitness

Ephemeral CI environments using ttl.sh and Gitness

1
Comments
4 min read
Você já conhece o Digestabot?

Você já conhece o Digestabot?

3
Comments
2 min read
Authorization Basics

Authorization Basics

Comments
8 min read
Geo-Distributed Face Template Storage in Face Recognition API

Geo-Distributed Face Template Storage in Face Recognition API

1
Comments
2 min read
Enhance Security and Defeat Spoofing: A Comprehensive Guide to Liveness Detection Implementation

Enhance Security and Defeat Spoofing: A Comprehensive Guide to Liveness Detection Implementation

1
Comments
2 min read
The Ultimate Guide to Securing Virtual Machines

The Ultimate Guide to Securing Virtual Machines

1
Comments
5 min read
Secure Web Authentication with a Serverless API: A Quick Guide

Secure Web Authentication with a Serverless API: A Quick Guide

14
Comments 1
6 min read
AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

AWS: EKS Pod Identities — a replacement for IRSA? Simplifying IAM access management

1
Comments
5 min read
👮🛡️ Let's Navigate the Angular Playground with Route Guards

👮🛡️ Let's Navigate the Angular Playground with Route Guards

1
Comments
2 min read
How to secure a WordPress website in under 1 minute using a simple trick?

How to secure a WordPress website in under 1 minute using a simple trick?

2
Comments 2
2 min read
Demystifying Blockchain Technology

Demystifying Blockchain Technology

14
Comments 7
6 min read
How to Do Authorization - A Decision Framework: Part 1

How to Do Authorization - A Decision Framework: Part 1

62
Comments
7 min read
REST API - Basic components of Authorization and Authentication

REST API - Basic components of Authorization and Authentication

Comments
2 min read
The broken spaceship Honeypot updates

The broken spaceship Honeypot updates

3
Comments
1 min read
AWS Well-Architected Review in Action

AWS Well-Architected Review in Action

15
Comments 1
4 min read
Application Security 101

Application Security 101

6
Comments 2
3 min read
Common Security Vulnerabilities in Dockerfiles

Common Security Vulnerabilities in Dockerfiles

Comments
3 min read
Open redirect vulnerabilities in Rails apps

Open redirect vulnerabilities in Rails apps

Comments
2 min read
Umbraco, Security and Headers

Umbraco, Security and Headers

2
Comments
2 min read
Launching Your Career in Cybersecurity: Insights and Strategies for Success

Launching Your Career in Cybersecurity: Insights and Strategies for Success

1
Comments
3 min read
Essential guide to WebSocket authentication

Essential guide to WebSocket authentication

8
Comments
9 min read
Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

Decoding the Cyber Threat Landscape: Exploring Different Types of Cyber Attacks

11
Comments
8 min read
Fortify Your Code: How the NSA's Push for Memory-Safe Languages Can Revolutionize Cybersecurity

Fortify Your Code: How the NSA's Push for Memory-Safe Languages Can Revolutionize Cybersecurity

Comments
2 min read
Welcome to modern web

Welcome to modern web

Comments
4 min read
Hardening Cluster Security in Google Kubernetes Engine

Hardening Cluster Security in Google Kubernetes Engine

11
Comments
6 min read
Swift and Strategic Response: Dealing with Exposed IAM Access Keys

Swift and Strategic Response: Dealing with Exposed IAM Access Keys

2
Comments
3 min read
Providing storage for the IT department testing and training

Providing storage for the IT department testing and training

Comments
3 min read
Authentication vs Authorization: Exploring The Difference

Authentication vs Authorization: Exploring The Difference

10
Comments
5 min read
HTB University CTF 2023 Rev Writeups

HTB University CTF 2023 Rev Writeups

2
Comments
6 min read
Embracing the AI and Cybersecurity Evolution: Lessons from Tech Conferences

Embracing the AI and Cybersecurity Evolution: Lessons from Tech Conferences

2
Comments 1
2 min read
Coding and testing as related to Blockchain security

Coding and testing as related to Blockchain security

Comments 2
3 min read
Intro to Blockchain Security

Intro to Blockchain Security

Comments
3 min read
GitTrust (GT): Enhanced S/MIME Commit Signing with Device Authentication

GitTrust (GT): Enhanced S/MIME Commit Signing with Device Authentication

Comments
1 min read
Analyzing a Linux malware binary

Analyzing a Linux malware binary

26
Comments 5
4 min read
Mastering File Upload Security: Understanding File Types

Mastering File Upload Security: Understanding File Types

57
Comments 1
8 min read
Learn Security Best Practices with Sls-mentor latest Security Package

Learn Security Best Practices with Sls-mentor latest Security Package

Comments
2 min read
Pieces’ SOC 2 Journey: Critical Compliance for AI Developer Tools

Pieces’ SOC 2 Journey: Critical Compliance for AI Developer Tools

Comments
8 min read
Using IAM authentication for Redis on AWS

Using IAM authentication for Redis on AWS

5
Comments
5 min read
Security 101 - Phishing

Security 101 - Phishing

1
Comments
2 min read
The Top 10 AWS EC2 Security Risks: What You Need to Know

The Top 10 AWS EC2 Security Risks: What You Need to Know

Comments
2 min read
How does machine to machine authentication work?

How does machine to machine authentication work?

9
Comments
11 min read
Implantando e conectando-se a uma Instância EC2 usando AWS System Manager e Terraform.

Implantando e conectando-se a uma Instância EC2 usando AWS System Manager e Terraform.

2
Comments
5 min read
🚀 Top 12 Open Source Auth Projects Every Developer Should Know 🔑

🚀 Top 12 Open Source Auth Projects Every Developer Should Know 🔑

3
Comments
9 min read
Combining 2FA and Public Key Authentication for a better Linux SSH security

Combining 2FA and Public Key Authentication for a better Linux SSH security

10
Comments
6 min read
Cloud Pentest 101

Cloud Pentest 101

35
Comments
2 min read
TechBash: Automation, Security and Development Best Practices In The Poconos

TechBash: Automation, Security and Development Best Practices In The Poconos

7
Comments
9 min read
How security and privacy impacts the database design

How security and privacy impacts the database design

6
Comments 2
7 min read
What is a Slowloris Attack | How Does a Slowloris Attack Work?

What is a Slowloris Attack | How Does a Slowloris Attack Work?

1
Comments
5 min read
How Developers are Using Offline AI Tools for Air-Gapped Security

How Developers are Using Offline AI Tools for Air-Gapped Security

Comments 2
8 min read
Read other users orders via CDN Caching - New vulnerability in SAP Commerce (CVE-2023-37486)

Read other users orders via CDN Caching - New vulnerability in SAP Commerce (CVE-2023-37486)

Comments
2 min read
What's New With AWS Security? | November Edition

What's New With AWS Security? | November Edition

4
Comments 1
6 min read
Exploring the Horizon of Digital Identity: The Concept of Encrypted-Sovereign Credentials (ENSC)

Exploring the Horizon of Digital Identity: The Concept of Encrypted-Sovereign Credentials (ENSC)

Comments 2
6 min read
Which is More Secure: Linux or Windows?

Which is More Secure: Linux or Windows?

6
Comments 1
3 min read
We built GPT Bot focused on API Security

We built GPT Bot focused on API Security

Comments
2 min read
Hacking embedded systems using the routersploit tool

Hacking embedded systems using the routersploit tool

2
Comments
2 min read
EKS on AWS re:Invent 2023

EKS on AWS re:Invent 2023

Comments
6 min read
LDAP protocol basics and the LDAP Injection attack

LDAP protocol basics and the LDAP Injection attack

5
Comments 1
4 min read
loading...