DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Controlling access in service-to-service communications with Cognito - Part 1

Controlling access in service-to-service communications with Cognito - Part 1

21
Comments
6 min read
Shortcut for AWS CDK credentials: insanely simple setup for SSO, SAML, and named profiles

Shortcut for AWS CDK credentials: insanely simple setup for SSO, SAML, and named profiles

18
Comments
6 min read
Logging SSH and Session activity using AWS Systems Manager

Logging SSH and Session activity using AWS Systems Manager

17
Comments
5 min read
Encrypting Folders on MacOS

Encrypting Folders on MacOS

3
Comments
1 min read
Secure TCP tunnel from anywhere with curl and nc for single connection

Secure TCP tunnel from anywhere with curl and nc for single connection

17
Comments
14 min read
Passwordless face login with Entry in the React app

Passwordless face login with Entry in the React app

7
Comments
3 min read
Getting started developing Falco

Getting started developing Falco

5
Comments
8 min read
Support Tips #1 - Digital Security Basics

Support Tips #1 - Digital Security Basics

4
Comments
9 min read
Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

4
Comments 1
1 min read
Distroless Alpine

Distroless Alpine

13
Comments 1
3 min read
Running Basic Security Tests Against Twitter API

Running Basic Security Tests Against Twitter API

4
Comments
1 min read
Understanding the Shared Responsibility Model in AWS

Understanding the Shared Responsibility Model in AWS

8
Comments
4 min read
What is AWS Detective?

What is AWS Detective?

5
Comments
2 min read
🎞️ This is how we maintain & release Secured Software on Github 🤖

🎞️ This is how we maintain & release Secured Software on Github 🤖

4
Comments
2 min read
Build a discoverable change password form

Build a discoverable change password form

12
Comments
1 min read
1Password for SSH changed the way I work

1Password for SSH changed the way I work

9
Comments
3 min read
How to spot poor implementations of 2FA

How to spot poor implementations of 2FA

12
Comments
2 min read
How I scanned dev.to APIs for vulnerabilities

How I scanned dev.to APIs for vulnerabilities

32
Comments 3
1 min read
CloudFront Standing In the Front

CloudFront Standing In the Front

15
Comments
4 min read
Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

9
Comments
8 min read
Kubernetes least privilege implementation using the Google Cloud as an example

Kubernetes least privilege implementation using the Google Cloud as an example

9
Comments
7 min read
Lets talk a bit about ISO/IEC 27001

Lets talk a bit about ISO/IEC 27001

10
Comments 1
5 min read
Controlling access to the API with Lambda authorizers

Controlling access to the API with Lambda authorizers

12
Comments
6 min read
From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

5
Comments
4 min read
Role of a SecOps Center, SecOps team, & SecOps with AI

Role of a SecOps Center, SecOps team, & SecOps with AI

7
Comments
3 min read
loading...