DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Exploring Blockchain's Role in the Metaverse

Exploring Blockchain's Role in the Metaverse

Comments
3 min read
Online Security - A Simple Guide

Online Security - A Simple Guide

Comments
4 min read
Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

142
Comments 5
6 min read
Mastering Nmap: A Comprehensive Guide

Mastering Nmap: A Comprehensive Guide

3
Comments
4 min read
Implementing access control on API Gateway endpoints with ID tokens

Implementing access control on API Gateway endpoints with ID tokens

19
Comments
7 min read
Vault Associate Certification (Part 10): Explain encryption as a service

Vault Associate Certification (Part 10): Explain encryption as a service

1
Comments
4 min read
Protect the repository hosting your GitHub Action

Protect the repository hosting your GitHub Action

6
Comments
7 min read
Vault Associate Certification (Part 9): Explain Vault architecture

Vault Associate Certification (Part 9): Explain Vault architecture

3
Comments
18 min read
Secure PHP APIs with Signature Verification Using OpenSSL

Secure PHP APIs with Signature Verification Using OpenSSL

6
Comments
3 min read
Is JWT Safe When Anyone Can Decode Plain Text Claims

Is JWT Safe When Anyone Can Decode Plain Text Claims

3
Comments
3 min read
API Keys vs. API Tokens

API Keys vs. API Tokens

1
Comments
8 min read
Demystifying DFIR: Understanding the Basics of Digital Forensics and Incident Response

Demystifying DFIR: Understanding the Basics of Digital Forensics and Incident Response

1
Comments
3 min read
Exploring Steganography in the Wild - Part 1

Exploring Steganography in the Wild - Part 1

20
Comments 8
20 min read
Building security for digital wallets and financial applications

Building security for digital wallets and financial applications

2
Comments 1
2 min read
Safeguarding Secrets in Spring Boot with Vault

Safeguarding Secrets in Spring Boot with Vault

5
Comments
3 min read
Networking for offensive security {0.1}

Networking for offensive security {0.1}

1
Comments
3 min read
Why Back Up DevOps Tools: What Is Worth Remembering?

Why Back Up DevOps Tools: What Is Worth Remembering?

1
Comments
7 min read
XSS Attack - Why strip_tags is not enough

XSS Attack - Why strip_tags is not enough

6
Comments 1
3 min read
Software Maintenance is Hard but there's Hope

Software Maintenance is Hard but there's Hope

2
Comments 1
3 min read
Connecting with SSL to CrateDB using the PostgreSQL protocol from Java-based applications

Connecting with SSL to CrateDB using the PostgreSQL protocol from Java-based applications

Comments
2 min read
The Role of API Standards in Data Privacy

The Role of API Standards in Data Privacy

Comments
2 min read
A Tale of the Glorious SSL in the World of Internet

A Tale of the Glorious SSL in the World of Internet

2
Comments
7 min read
DLP vs DRM - Understanding the differences

DLP vs DRM - Understanding the differences

1
Comments
3 min read
Securing Ubuntu for Production

Securing Ubuntu for Production

5
Comments
3 min read
Fuzzer Development With Rust

Fuzzer Development With Rust

1
Comments
3 min read
Adicionando uma chave SSH ao GitHub

Adicionando uma chave SSH ao GitHub

5
Comments 2
3 min read
Securing Your Code with GitHub

Securing Your Code with GitHub

40
Comments 1
7 min read
Security challenges with SaaS applications

Security challenges with SaaS applications

2
Comments
6 min read
Vault Associate Certification (Part 8): Be aware of the Vault API

Vault Associate Certification (Part 8): Be aware of the Vault API

1
Comments
3 min read
Vault Associate Certification (Part 7): Utilize Vault UI

Vault Associate Certification (Part 7): Utilize Vault UI

1
Comments
5 min read
Developer Week CloudX 2023 - Better security and accessibility in the cloud

Developer Week CloudX 2023 - Better security and accessibility in the cloud

Comments
11 min read
8 Essential WordPress Security Plugins to Keep Your Site Protected

8 Essential WordPress Security Plugins to Keep Your Site Protected

1
Comments
3 min read
The ideal password - proven with maths

The ideal password - proven with maths

Comments
5 min read
Identify and fix security vulnerabilities in Python code with Bandit

Identify and fix security vulnerabilities in Python code with Bandit

Comments
3 min read
OpenBSD acme-client で Let's Encrypt 証明書を取得する

OpenBSD acme-client で Let's Encrypt 証明書を取得する

3
Comments
4 min read
Problem: nginx problems redirecting non-www to my index.html page

Problem: nginx problems redirecting non-www to my index.html page

1
Comments
3 min read
Discover the key differences between AWS WAF, ACLs, and Security Groups to protect your cloud applications like a pro!

Discover the key differences between AWS WAF, ACLs, and Security Groups to protect your cloud applications like a pro!

1
Comments
4 min read
npm hack to remove unused transitive dependencies

npm hack to remove unused transitive dependencies

2
Comments
2 min read
How to connect to a remote server securely using Open SSH (Secure SHell)

How to connect to a remote server securely using Open SSH (Secure SHell)

1
Comments
2 min read
Most happening place - AWS VPC Subnets

Most happening place - AWS VPC Subnets

2
Comments
2 min read
Take the first steps to harden your Kubernetes cluster

Take the first steps to harden your Kubernetes cluster

2
Comments
8 min read
Vault Associate Certification (Part 6): Utilize Vault CLI

Vault Associate Certification (Part 6): Utilize Vault CLI

1
Comments
8 min read
Vault Associate Certification (Part 5): Compare and configure Vault secrets engines

Vault Associate Certification (Part 5): Compare and configure Vault secrets engines

1
Comments
11 min read
Securing the Connection to S3 from EC2

Securing the Connection to S3 from EC2

11
Comments
7 min read
API keys vs tokens - what’s the difference?

API keys vs tokens - what’s the difference?

2
Comments 1
4 min read
Core to your Global Presence - AWS VPC

Core to your Global Presence - AWS VPC

2
Comments
2 min read
Shadow API Adoption Skyrockets 900%! 🚀

Shadow API Adoption Skyrockets 900%! 🚀

13
Comments 3
2 min read
Researcher finds GitHub admin credentials of car company thanks to misconfiguration

Researcher finds GitHub admin credentials of car company thanks to misconfiguration

1
Comments
6 min read
Securing Your Data: AWS S3 Bucket Security Best Practices

Securing Your Data: AWS S3 Bucket Security Best Practices

3
Comments 1
4 min read
Unlocking efficient authZ with Cerbos’ Query Plan

Unlocking efficient authZ with Cerbos’ Query Plan

2
Comments
5 min read
Navigating the Dark Corners of the Internet with a Beacon of Hope

Navigating the Dark Corners of the Internet with a Beacon of Hope

2
Comments
2 min read
Wanna uncover sneaky APIs with us? 🐱‍👤 👀

Wanna uncover sneaky APIs with us? 🐱‍👤 👀

20
Comments
1 min read
A Humble Guide to a Password Authentication Implementation

A Humble Guide to a Password Authentication Implementation

2
Comments
4 min read
DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

2
Comments
14 min read
Five open-source projects to secure access to your applications

Five open-source projects to secure access to your applications

2
Comments
5 min read
Testing Banking Apps: Ensuring Security, Functionality, and User Experience

Testing Banking Apps: Ensuring Security, Functionality, and User Experience

5
Comments 2
4 min read
Everything you need to know about JSON Web Token

Everything you need to know about JSON Web Token

1
Comments
32 min read
Vault Associate Certification (Part 4): Manage Vault leases

Vault Associate Certification (Part 4): Manage Vault leases

2
Comments
4 min read
Why PayPal's Passkey Rollout Makes Sense

Why PayPal's Passkey Rollout Makes Sense

2
Comments
2 min read
Hunting Broken Social Media Links with Go

Hunting Broken Social Media Links with Go

Comments
7 min read
loading...