DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Use IAM Roles Anywhere to reduce the use of IAM keys

Use IAM Roles Anywhere to reduce the use of IAM keys

1
Comments
31 min read
Enumeração de DNS

Enumeração de DNS

1
Comments
6 min read
Mastering `is.boolean` for Type Checking in JavaScript with 'thiis': Fun Examples and Useful Tips

Mastering `is.boolean` for Type Checking in JavaScript with 'thiis': Fun Examples and Useful Tips

6
Comments 1
4 min read
Discover how to find hidden buckets in Amazon S3 Cloud.

Discover how to find hidden buckets in Amazon S3 Cloud.

3
Comments
9 min read
Hashing User Passwords Using bcrypt in Python

Hashing User Passwords Using bcrypt in Python

2
Comments
5 min read
Garantindo a proteção de dados financeiros com PCI-DSS

Garantindo a proteção de dados financeiros com PCI-DSS

Comments
2 min read
Prevent malicious Terraform Providers

Prevent malicious Terraform Providers

1
Comments
2 min read
AWS Lambda Permissions: Resource-Based Policies vs. IAM Roles

AWS Lambda Permissions: Resource-Based Policies vs. IAM Roles

3
Comments
4 min read
Guarding the Digital Fortress: A Comprehensive Guide to Intrusion Detection and Prevention Systems

Guarding the Digital Fortress: A Comprehensive Guide to Intrusion Detection and Prevention Systems

Comments
11 min read
Enhancing Deployment Security through the Integration of IAM Roles and GitHub Actions

Enhancing Deployment Security through the Integration of IAM Roles and GitHub Actions

2
Comments
3 min read
Data Privacy: How Much is too Much to Share for 'Free'?

Data Privacy: How Much is too Much to Share for 'Free'?

1
Comments
2 min read
🍯 Honeypots: Brief Introduction🍯

🍯 Honeypots: Brief Introduction🍯

Comments
1 min read
Implementing Role-Based Access Control in Django

Implementing Role-Based Access Control in Django

16
Comments
7 min read
Badge for Security FAQs: Strengthening Online Trust

Badge for Security FAQs: Strengthening Online Trust

1
Comments
2 min read
Rkhunter tutorial – Protect your PC

Rkhunter tutorial – Protect your PC

Comments
3 min read
Security 101 for developers: TCP/IP, SSL/TLS Certificates, AES/CBC Encryption, Password Storage, and More

Security 101 for developers: TCP/IP, SSL/TLS Certificates, AES/CBC Encryption, Password Storage, and More

13
Comments 1
7 min read
đź“Ś Implementing a Secure Baseline Scenario in Azure App Service Landing Zone Accelerator

đź“Ś Implementing a Secure Baseline Scenario in Azure App Service Landing Zone Accelerator

Comments
2 min read
Approach to address security in white labelled software?

Approach to address security in white labelled software?

Comments
3 min read
Are Notion Pages Private by Default?

Are Notion Pages Private by Default?

Comments
4 min read
Understand Amazon GuardDuty Findings

Understand Amazon GuardDuty Findings

5
Comments
4 min read
The Next Wave of DevOps: Security as a Team Sport

The Next Wave of DevOps: Security as a Team Sport

7
Comments 2
5 min read
The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

The Art of Protecting Secrets: Eight Essential Concepts for SecOps Practitioners

Comments
5 min read
My Journey to SC-400 Certification Success

My Journey to SC-400 Certification Success

8
Comments 2
4 min read
[Hands-On] AWS Lambda function URL with AWS IAM Authentication type

[Hands-On] AWS Lambda function URL with AWS IAM Authentication type

3
Comments
5 min read
Online Robots.txt Validator For Creating a Secure Robots.txt

Online Robots.txt Validator For Creating a Secure Robots.txt

2
Comments
3 min read
đź”’ How the Zero Trust Model Fortifies Azure Virtual Desktop Deployments

đź”’ How the Zero Trust Model Fortifies Azure Virtual Desktop Deployments

Comments
2 min read
API Security Checklist

API Security Checklist

Comments 2
1 min read
Scaling Authz: A Journey into Authorization Architectures

Scaling Authz: A Journey into Authorization Architectures

1
Comments
6 min read
Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 2. Secure Static Hosting

Deploying a Single Page Application (SPA) on AWS: A Beginner's Guide. Part 2. Secure Static Hosting

3
Comments
5 min read
An Introductory Guide To Web Application Firewall

An Introductory Guide To Web Application Firewall

6
Comments
2 min read
Getting Started with AWS GuardDuty with Best Practices.

Getting Started with AWS GuardDuty with Best Practices.

2
Comments
5 min read
Passwords vs Keys

Passwords vs Keys

2
Comments
2 min read
Using DNS over TLS on openSUSE Linux in 4 easy steps, enable cloud firewall for free today!

Using DNS over TLS on openSUSE Linux in 4 easy steps, enable cloud firewall for free today!

1
Comments 7
5 min read
Cross Site Scripting attacks (XSS)

Cross Site Scripting attacks (XSS)

4
Comments
5 min read
Criar IAM Role Cross-Account

Criar IAM Role Cross-Account

6
Comments
6 min read
On the joy of learning and bypassing brute-force protection

On the joy of learning and bypassing brute-force protection

1
Comments
4 min read
Risky Click Text Editor Edition

Risky Click Text Editor Edition

1
Comments
1 min read
Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍

Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍

3
Comments
10 min read
Harnessing the Combination of Tailscale and Osquery

Harnessing the Combination of Tailscale and Osquery

Comments
3 min read
Securing Nodemailer with Proper Authentication

Securing Nodemailer with Proper Authentication

5
Comments
11 min read
Securing Secrets in the Age of GitOps

Securing Secrets in the Age of GitOps

Comments
4 min read
Web Security Encryption

Web Security Encryption

1
Comments
4 min read
Detecting Failed Sign In Attempts to AWS and Alerting

Detecting Failed Sign In Attempts to AWS and Alerting

6
Comments 1
7 min read
Password protection for developers: importance and best practices

Password protection for developers: importance and best practices

6
Comments
5 min read
Utilizing SSM Documents for Seamless Tunneling to RDS

Utilizing SSM Documents for Seamless Tunneling to RDS

Comments
2 min read
Controlling access to IAM-protected API endpoints with Cognito groups

Controlling access to IAM-protected API endpoints with Cognito groups

3
Comments
7 min read
Finding the Right Balance in Gradle Dependency Strategy

Finding the Right Balance in Gradle Dependency Strategy

28
Comments 2
11 min read
How to Implement Passkey Authentication and Fine-Grained Authorization in JavaScript

How to Implement Passkey Authentication and Fine-Grained Authorization in JavaScript

8
Comments 1
12 min read
SQL Injections at Work

SQL Injections at Work

1
Comments
4 min read
Security of Navalny's underground resistance on the Dark Web

Security of Navalny's underground resistance on the Dark Web

11
Comments
16 min read
SSH a headache when trying to test connection on GITHUB

SSH a headache when trying to test connection on GITHUB

Comments
1 min read
Ruby on Rails password validation

Ruby on Rails password validation

Comments
1 min read
Linux security LAB Broken Spaceship

Linux security LAB Broken Spaceship

6
Comments 2
1 min read
O uso antiético de um leitor de código de barras

O uso antiético de um leitor de código de barras

2
Comments 1
2 min read
Overview of Containerization with Docker.

Overview of Containerization with Docker.

Comments
3 min read
Introdução ao SSH

Introdução ao SSH

57
Comments
3 min read
Writing secure code for web applications🔓

Writing secure code for web applications🔓

1
Comments
4 min read
Kaynak IP’ye göre AWS Erişiminin Engellenmesi

Kaynak IP’ye göre AWS Erişiminin Engellenmesi

1
Comments 1
2 min read
CodeCommit Access from EC2

CodeCommit Access from EC2

4
Comments
6 min read
Throttling Rails logins with Rack Attack

Throttling Rails logins with Rack Attack

6
Comments 2
2 min read
loading...