DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS is only as safe as the weakest credentials setup for your developers.

AWS is only as safe as the weakest credentials setup for your developers.

13
Comments
10 min read
No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

9
Comments 1
7 min read
What is SecOps and Its Benefits

What is SecOps and Its Benefits

5
Comments
3 min read
Enarx: The future of Trusted Execution Environment Frameworks

Enarx: The future of Trusted Execution Environment Frameworks

11
Comments
3 min read
https

https

6
Comments
4 min read
Little step to use PKI easiest

Little step to use PKI easiest

10
Comments
7 min read
Getting Started with Matrix

Getting Started with Matrix

6
Comments
4 min read
JWT, access token, and refresh token

JWT, access token, and refresh token

7
Comments
3 min read
WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

7
Comments 1
1 min read
Protecting APIs with custom headers in CloudFront

Protecting APIs with custom headers in CloudFront

19
Comments 2
6 min read
OverTheWire Natas Levels 0-11 Thinking Out Loud

OverTheWire Natas Levels 0-11 Thinking Out Loud

7
Comments
10 min read
Best Practices for Securing Your Vulnerable REST APIs

Best Practices for Securing Your Vulnerable REST APIs

9
Comments
1 min read
How do you Integrate Emissary Ingress with OPA

How do you Integrate Emissary Ingress with OPA

6
Comments
7 min read
Handling Sensitive Data: A Primer

Handling Sensitive Data: A Primer

20
Comments
6 min read
Keyoxide Proof

Keyoxide Proof

4
Comments
1 min read
How to detect your leaking API endpoints using EthicalCheck

How to detect your leaking API endpoints using EthicalCheck

4
Comments
1 min read
CherryBomb: So what's new??

CherryBomb: So what's new??

15
Comments
2 min read
Revoking Access with a JWT Blacklist/Deny List

Revoking Access with a JWT Blacklist/Deny List

4
Comments
8 min read
How to security scan your web API for vulnerabilities

How to security scan your web API for vulnerabilities

11
Comments
2 min read
What is HTTPS?

What is HTTPS?

10
Comments
4 min read
5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

3
Comments 1
3 min read
How to install Kyverno in a k8s cluster?

How to install Kyverno in a k8s cluster?

12
Comments
1 min read
10 tips for volunteering devs from data security engineers

10 tips for volunteering devs from data security engineers

10
Comments 1
3 min read
⚖️ Bench (and choose) Java-8 docker images with anchore/grype

⚖️ Bench (and choose) Java-8 docker images with anchore/grype

7
Comments 3
4 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

88
Comments 3
3 min read
loading...