DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

Comments
1 min read
Security news weekly round-up - 1st November 2024

Security news weekly round-up - 1st November 2024

1
Comments
4 min read
AWS Web Application Firewall (WAF)

AWS Web Application Firewall (WAF)

5
Comments
6 min read
Move hardcoded secrets to a Secrets Manager

Move hardcoded secrets to a Secrets Manager

1
Comments
2 min read
E-wallet Security: How Developers Can Ensure Transaction Protection

E-wallet Security: How Developers Can Ensure Transaction Protection

Comments
2 min read
🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

Comments
3 min read
HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant

HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant

9
Comments
8 min read
Beyond AES — Modern Encryption for Laravel with XChaCha20

Beyond AES — Modern Encryption for Laravel with XChaCha20

Comments
2 min read
Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Comments
6 min read
Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Comments
3 min read
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

10
Comments
6 min read
Debian 12 … is amazing! How to: Create your custom codehouse [Part 3B/4]

Debian 12 … is amazing! How to: Create your custom codehouse [Part 3B/4]

1
Comments
15 min read
Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Comments
2 min read
Container Security Scanning: Vulnerabilities, Risks and Tooling

Container Security Scanning: Vulnerabilities, Risks and Tooling

Comments
10 min read
BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

Comments
43 min read
Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

83
Comments 12
4 min read
LINUX CHALLENGE, DAY 4

LINUX CHALLENGE, DAY 4

4
Comments
1 min read
Role-Based Access Control (RBAC) with Feature-Centric Approach

Role-Based Access Control (RBAC) with Feature-Centric Approach

1
Comments
3 min read
How to optimize BitNinja for weak servers

How to optimize BitNinja for weak servers

8
Comments
5 min read
Error 403 Unauthorized: Understanding Its Implications for Apache Security

Error 403 Unauthorized: Understanding Its Implications for Apache Security

Comments
6 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Comments
4 min read
Elevate Your Next.js Security: Middleware Authorization with Userfront

Elevate Your Next.js Security: Middleware Authorization with Userfront

Comments
4 min read
Understanding Namespaces in Kubernetes

Understanding Namespaces in Kubernetes

10
Comments
6 min read
BSides Orlando 2024: Insights, Innovations, and Security Adventures

BSides Orlando 2024: Insights, Innovations, and Security Adventures

2
Comments
7 min read
What Was GCHQ's Project Tempora? Is This Still Was?

What Was GCHQ's Project Tempora? Is This Still Was?

2
Comments
13 min read
AWS Security Group vs NACL: What’s the Difference?

AWS Security Group vs NACL: What’s the Difference?

1
Comments
2 min read
Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

1
Comments
9 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
New tools for effortless policy creation and testing in Cerbos Hub

New tools for effortless policy creation and testing in Cerbos Hub

Comments
3 min read
Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

7
Comments
4 min read
Identity Management: The Foundation for Security Implementation

Identity Management: The Foundation for Security Implementation

8
Comments 1
5 min read
AI Security: How to Protect Your Projects with Hardened ModelKits

AI Security: How to Protect Your Projects with Hardened ModelKits

45
Comments
7 min read
Storing passwords safely (C#)

Storing passwords safely (C#)

54
Comments 26
6 min read
Hacking (and securing) GraphQL

Hacking (and securing) GraphQL

5
Comments
13 min read
Leverage IP Data for Dynamic User Access Management 🌐

Leverage IP Data for Dynamic User Access Management 🌐

42
Comments 1
4 min read
AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

7
Comments
6 min read
Greatly improve your Health Endpoint with these tips!

Greatly improve your Health Endpoint with these tips!

1
Comments
2 min read
The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

Comments
2 min read
The Dynamic Application Security Testing Process: A Step-by-Step Guide

The Dynamic Application Security Testing Process: A Step-by-Step Guide

Comments
4 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
SSL Pinning in React Native for iOS and Android

SSL Pinning in React Native for iOS and Android

7
Comments
4 min read
Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

5
Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

8
Comments
4 min read
Enhancing data security with FIM (file integrity monitoring) 🔐

Enhancing data security with FIM (file integrity monitoring) 🔐

1
Comments
1 min read
How I Secured My Containerized Application Using Anchore (Day 29 Project)

How I Secured My Containerized Application Using Anchore (Day 29 Project)

Comments
3 min read
What Is WebAuthN: A Developer's Guide To WebAuthN

What Is WebAuthN: A Developer's Guide To WebAuthN

Comments
6 min read
Learn about basic Authentication

Learn about basic Authentication

2
Comments
4 min read
Ten Must-Have Endpoint Security Tools for 2025

Ten Must-Have Endpoint Security Tools for 2025

Comments
2 min read
DevOps Prerequisite (Part 9): SSL and TLS

DevOps Prerequisite (Part 9): SSL and TLS

Comments
4 min read
Issue 66 of AWS Cloud Security Weekly

Issue 66 of AWS Cloud Security Weekly

1
Comments
1 min read
K8s Plugins For Solid Security

K8s Plugins For Solid Security

Comments
2 min read
Hidden Risk Of Relying On Labels In Kubernetes Security

Hidden Risk Of Relying On Labels In Kubernetes Security

Comments
2 min read
Whats Information Security?

Whats Information Security?

Comments
1 min read
Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash: A Robust Module for Secure Password Hashing

5
Comments
3 min read
Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

1
Comments
1 min read
Understanding Git Tags and Checkout

Understanding Git Tags and Checkout

9
Comments 1
7 min read
Automating Vulnerability Detection for Your Assets

Automating Vulnerability Detection for Your Assets

Comments
13 min read
Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

2
Comments
4 min read
🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

137
Comments 9
6 min read
Bypassing Bot Detection Software with Selenium in Python

Bypassing Bot Detection Software with Selenium in Python

5
Comments
2 min read
loading...