DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
Strategies to Securing Sensitive Documents in SharePoint

Strategies to Securing Sensitive Documents in SharePoint

10
Comments
3 min read
LINUX CHALLENGE DAY 5

LINUX CHALLENGE DAY 5

Comments 3
1 min read
Turning Ideas into Art: Texas Animation Studios You Should Know

Turning Ideas into Art: Texas Animation Studios You Should Know

Comments
5 min read
Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Comments
2 min read
How to install and configure Fail2ban for protecting SSH and Nginx

How to install and configure Fail2ban for protecting SSH and Nginx

Comments
2 min read
SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

Comments
7 min read
How to Use Kubernetes CronJob

How to Use Kubernetes CronJob

5
Comments
6 min read
ToxicPanda: A New Malware Threat to Android Users and Their Bank Accounts

ToxicPanda: A New Malware Threat to Android Users and Their Bank Accounts

11
Comments 1
2 min read
[2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Cerbos:-> Authorization-as-a-Service

Cerbos:-> Authorization-as-a-Service

7
Comments
5 min read
Kubernetes Custom Resources

Kubernetes Custom Resources

6
Comments
7 min read
Understanding Rate Limiting: A Guide to Protecting Your APIs and Applications

Understanding Rate Limiting: A Guide to Protecting Your APIs and Applications

4
Comments
4 min read
Understanding Kubernetes Security: Common Vulnerabilities and Modern Solutions

Understanding Kubernetes Security: Common Vulnerabilities and Modern Solutions

6
Comments
3 min read
Sentinel Overview

Sentinel Overview

Comments
2 min read
Authentication vs. Authorization: Key Differences and Security Risks Explained

Authentication vs. Authorization: Key Differences and Security Risks Explained

Comments
2 min read
Password Managers Explained: The Easiest Way to Stay Secure Online

Password Managers Explained: The Easiest Way to Stay Secure Online

7
Comments
3 min read
Threat Modeling for Non-Security Experts

Threat Modeling for Non-Security Experts

Comments
5 min read
Docker Cheat Sheet - Most Useful Commands

Docker Cheat Sheet - Most Useful Commands

8
Comments
5 min read
Understanding JWT Security Principle

Understanding JWT Security Principle

Comments
2 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 2

Migrando Aplicativos de uma Nuvem para Outra - Parte 2

11
Comments
4 min read
AWS EBS Encryption Simplified : Protecting Your Cloud Data Effectively

AWS EBS Encryption Simplified : Protecting Your Cloud Data Effectively

8
Comments 1
6 min read
OS Security: Master Auditing and Protect Your Windows System

OS Security: Master Auditing and Protect Your Windows System

Comments
2 min read
Importance of Compliance (GDPR, HIPAA)

Importance of Compliance (GDPR, HIPAA)

12
Comments
3 min read
OAuth2 in Action: Real-World Use Cases and Examples

OAuth2 in Action: Real-World Use Cases and Examples

6
Comments
3 min read
How to Make a Product Secure: A Developer's Perspective

How to Make a Product Secure: A Developer's Perspective

9
Comments
3 min read
Don’t make security an afterthought when designing APIs

Don’t make security an afterthought when designing APIs

9
Comments
2 min read
Working with Git Remotes

Working with Git Remotes

7
Comments
6 min read
Security by Design: Building Trust in Blockchain, One Block at a Time

Security by Design: Building Trust in Blockchain, One Block at a Time

Comments
2 min read
Hardware Security Modules: Preparing for the Post-Quantum Era

Hardware Security Modules: Preparing for the Post-Quantum Era

Comments
5 min read
Prevent Directory Traversal in Laravel: Expert Guide

Prevent Directory Traversal in Laravel: Expert Guide

5
Comments
2 min read
Protect Sensitive Data on AWS: A Beginner’s Guide to Amazon Macie

Protect Sensitive Data on AWS: A Beginner’s Guide to Amazon Macie

9
Comments 3
5 min read
Resolving ECS Task Definition Security Risks Detected by AWS Security Hub Using Secrets Manager

Resolving ECS Task Definition Security Risks Detected by AWS Security Hub Using Secrets Manager

3
Comments
3 min read
Demystifying OTPs: the logic behind the offline generation of tokens

Demystifying OTPs: the logic behind the offline generation of tokens

6
Comments 2
16 min read
JSON Web Tokens (JWT)

JSON Web Tokens (JWT)

45
Comments 7
2 min read
Laravel Data Encryption and Decryption

Laravel Data Encryption and Decryption

Comments
3 min read
Secure AWS VPC using Public and Private Subnets

Secure AWS VPC using Public and Private Subnets

4
Comments
10 min read
How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

7
Comments 1
4 min read
7 firewall management best practices in 2024

7 firewall management best practices in 2024

Comments
4 min read
Looking for some feedback on my team's new open-source secrets vault project.

Looking for some feedback on my team's new open-source secrets vault project.

2
Comments 2
1 min read
Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

5
Comments
4 min read
Understanding Kubernetes Jobs

Understanding Kubernetes Jobs

4
Comments
5 min read
AI Engineer's Tool Review: Guardrails AI

AI Engineer's Tool Review: Guardrails AI

Comments
1 min read
Securing external-dns: Encrypting TXT Registry Records

Securing external-dns: Encrypting TXT Registry Records

Comments
5 min read
The Role of Machine Learning in Enhancing Network Security

The Role of Machine Learning in Enhancing Network Security

1
Comments
3 min read
Low-Code, Big Risks: Why Security Awareness is Crucial for Citizen Developers

Low-Code, Big Risks: Why Security Awareness is Crucial for Citizen Developers

6
Comments
2 min read
Ensuring Secure and Efficient Banking Apps through Rigorous Testing

Ensuring Secure and Efficient Banking Apps through Rigorous Testing

11
Comments
5 min read
Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Comments
3 min read
🍯 Honeypot field: an easy to implement React security technique

🍯 Honeypot field: an easy to implement React security technique

5
Comments
2 min read
Two Years in the Vault: 4 Best Practices 🔒

Two Years in the Vault: 4 Best Practices 🔒

8
Comments
9 min read
Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
What Is security.txt and How Can It Help Improve Website Security?

What Is security.txt and How Can It Help Improve Website Security?

7
Comments
3 min read
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

5
Comments
2 min read
Git Undo Last Commit

Git Undo Last Commit

4
Comments
4 min read
Deleting Git Commits

Deleting Git Commits

4
Comments
5 min read
Introduction to DevSecOps

Introduction to DevSecOps

38
Comments 3
3 min read
🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

2
Comments
3 min read
loading...