DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding OAuth and OIDC: Introduction

Understanding OAuth and OIDC: Introduction

5
Comments
2 min read
How to use environment variables with cl-dotenv in a Common Lisp web app

How to use environment variables with cl-dotenv in a Common Lisp web app

12
Comments
2 min read
What is Rootkit?

What is Rootkit?

6
Comments
2 min read
Prevent sensitive data exposure in log with Serilog

Prevent sensitive data exposure in log with Serilog

18
Comments 6
2 min read
How to Automate REST API Security Testing

How to Automate REST API Security Testing

100
Comments 6
2 min read
How to create a SFTP server on EC2(CentOS/Ubuntu) ?

How to create a SFTP server on EC2(CentOS/Ubuntu) ?

38
Comments 1
4 min read
C#: Modify Claims via Middleware in ASP.NET

C#: Modify Claims via Middleware in ASP.NET

15
Comments 5
3 min read
Using AWS JWT authorizers with Auth0

Using AWS JWT authorizers with Auth0

9
Comments
8 min read
🪄 Introducing jq tricks to Grype-Contribs

🪄 Introducing jq tricks to Grype-Contribs

1
Comments 4
1 min read
Protect Your Angular App From Cross-Site Scripting

Protect Your Angular App From Cross-Site Scripting

17
Comments
12 min read
AWS GuardDuty - Now Packing Malware protections

AWS GuardDuty - Now Packing Malware protections

4
Comments
1 min read
How to effectively implement Static Application Security Testing (SAST)?

How to effectively implement Static Application Security Testing (SAST)?

2
Comments
7 min read
How to apply security at the source using GitOps

How to apply security at the source using GitOps

3
Comments
13 min read
Closing that busines logic attack vector

Closing that busines logic attack vector

12
Comments
2 min read
AWS re:Inforce 2022 keynote highlights

AWS re:Inforce 2022 keynote highlights

12
Comments
3 min read
Protect Your Angular App From Cross-Site Request Forgery

Protect Your Angular App From Cross-Site Request Forgery

9
Comments
3 min read
How hackers steal MetaMask seed? And how to protect it from their attack?

How hackers steal MetaMask seed? And how to protect it from their attack?

6
Comments
1 min read
What is Cross-Site Scripting vulnerability? How to find it? How to prevent a XSS attack?

What is Cross-Site Scripting vulnerability? How to find it? How to prevent a XSS attack?

5
Comments
4 min read
Securing Kubernetes Cluster using Kubescape and kube-bench

Securing Kubernetes Cluster using Kubescape and kube-bench

5
Comments
11 min read
RBAC with OPA

RBAC with OPA

8
Comments
9 min read
Hazardous implementation of password reset

Hazardous implementation of password reset

13
Comments
3 min read
How to fuzz java code with jazzer?

How to fuzz java code with jazzer?

11
Comments 2
6 min read
DevSecOps: A Complete Guide

DevSecOps: A Complete Guide

22
Comments
8 min read
What is DAST - Dynamic Application Security Testing?

What is DAST - Dynamic Application Security Testing?

3
Comments
5 min read
Typing your way into safety

Typing your way into safety

9
Comments 3
5 min read
loading...