DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Manage Data Access for Developers

How to Manage Data Access for Developers

Comments
6 min read
Extending Buildkite with plugins: HashiCorp Vault

Extending Buildkite with plugins: HashiCorp Vault

Comments
4 min read
Math for Devs - Encryption Essentials

Math for Devs - Encryption Essentials

14
Comments 1
6 min read
Vault Associate Certification (Part 3): Assess Vault tokens

Vault Associate Certification (Part 3): Assess Vault tokens

2
Comments
12 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
IP Info was a mistake, and how digging for the source of the problem is tricky

IP Info was a mistake, and how digging for the source of the problem is tricky

5
Comments
3 min read
Top 10 Password Hacking Tools for 2023

Top 10 Password Hacking Tools for 2023

5
Comments
11 min read
Meet the Team: Matthias & Knowledge Transfer

Meet the Team: Matthias & Knowledge Transfer

5
Comments
7 min read
OSCM: The Open Source Consumption Manifesto

OSCM: The Open Source Consumption Manifesto

5
Comments
5 min read
What is Cyber Security and why is it needed?

What is Cyber Security and why is it needed?

6
Comments 1
4 min read
Diving into AWS - Understanding IAM

Diving into AWS - Understanding IAM

8
Comments 1
8 min read
What's new and noteworthy on AWS - Summer 2023 edition

What's new and noteworthy on AWS - Summer 2023 edition

5
Comments
24 min read
Invisible Banking Trojan learned to use a Rare and Interesting Protocol

Invisible Banking Trojan learned to use a Rare and Interesting Protocol

Comments
1 min read
Restricting access through IAM policies

Restricting access through IAM policies

13
Comments 1
6 min read
5 Essential Data Privacy Regulations for Businesses to Know in 2023

5 Essential Data Privacy Regulations for Businesses to Know in 2023

1
Comments
5 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

16
Comments 3
7 min read
OWASP Top 10 for LLMs

OWASP Top 10 for LLMs

Comments
1 min read
Creating a Private Endpoint for Azure Storage Account using Terraform

Creating a Private Endpoint for Azure Storage Account using Terraform

21
Comments 1
4 min read
A Beginner’s Guide to Authentication and Authorization in Rails

A Beginner’s Guide to Authentication and Authorization in Rails

Comments
10 min read
Two approaches to make your APIs more secure

Two approaches to make your APIs more secure

21
Comments 7
11 min read
Implementing item-level access control to DynamoDB tables

Implementing item-level access control to DynamoDB tables

3
Comments
9 min read
Vault Associate Certification (Part 2): Create Vault policies

Vault Associate Certification (Part 2): Create Vault policies

1
Comments
8 min read
Deploy Authorizer to Handle User Authentication on Koyeb

Deploy Authorizer to Handle User Authentication on Koyeb

Comments
8 min read
CloudDefense.AI helped secure a database that contained entries of over 153,000 users

CloudDefense.AI helped secure a database that contained entries of over 153,000 users

Comments
2 min read
URI vs URL: The real difference between the two

URI vs URL: The real difference between the two

1
Comments
2 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
ZenStack: The Complete Authorization Solution for Prisma Projects

ZenStack: The Complete Authorization Solution for Prisma Projects

29
Comments 2
8 min read
🛡️The Ultimate Defense: Introduction to Spring Security 🔐

🛡️The Ultimate Defense: Introduction to Spring Security 🔐

1
Comments
3 min read
API Security: Error Handling Guide

API Security: Error Handling Guide

2
Comments
4 min read
Password strength detector with machine learning

Password strength detector with machine learning

5
Comments
2 min read
Exploring third-party services with webhooks

Exploring third-party services with webhooks

7
Comments
6 min read
Avoid Smart Contract Hacks with Fuzz Testing

Avoid Smart Contract Hacks with Fuzz Testing

5
Comments
6 min read
Navigating Security and Compliance

Navigating Security and Compliance

10
Comments 2
4 min read
For Devops necessary Tools and Technology

For Devops necessary Tools and Technology

1
Comments
2 min read
What is Devops

What is Devops

1
Comments
2 min read
Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

13
Comments
12 min read
How to Install and Configure Kerberos on Windows 10

How to Install and Configure Kerberos on Windows 10

Comments
2 min read
Why I started writing regularly

Why I started writing regularly

22
Comments 7
4 min read
What is an OSPO and why is it important?

What is an OSPO and why is it important?

3
Comments
10 min read
Safeguarding Your Digital World: The Imperative of Data Security

Safeguarding Your Digital World: The Imperative of Data Security

1
Comments
3 min read
Autenticação e Autorização de uma ASP .NET Web API com Keycloak

Autenticação e Autorização de uma ASP .NET Web API com Keycloak

183
Comments 6
9 min read
Using Technology to Enhance Bitcoin Tracing

Using Technology to Enhance Bitcoin Tracing

3
Comments 2
2 min read
Guide to Generating SSL Certificates Using OpenSSL for Web Applications

Guide to Generating SSL Certificates Using OpenSSL for Web Applications

1
Comments
2 min read
Vault Associate Certification (Part 1): Compare authentication methods

Vault Associate Certification (Part 1): Compare authentication methods

2
Comments 1
11 min read
How To Install Private Git Hosted Dependencies Inside Docker Image Using SSH

How To Install Private Git Hosted Dependencies Inside Docker Image Using SSH

9
Comments 2
2 min read
Using Laravel Policy with middleware to protect routes

Using Laravel Policy with middleware to protect routes

2
Comments 2
2 min read
Demystifying Malware: Types, Detection, and Prevention Techniques

Demystifying Malware: Types, Detection, and Prevention Techniques

Comments
7 min read
An Introduction for Developers to Information Security

An Introduction for Developers to Information Security

4
Comments
6 min read
Simplifying Servlet Security: Keeping Your Web Apps Safe

Simplifying Servlet Security: Keeping Your Web Apps Safe

1
Comments
4 min read
Session Manager: SSH to EC2 Instances Securely

Session Manager: SSH to EC2 Instances Securely

9
Comments
6 min read
Building a Secure and Compliant Message Center with React & DataMotion

Building a Secure and Compliant Message Center with React & DataMotion

3
Comments
5 min read
Setting up Bcrypt in your Rails project

Setting up Bcrypt in your Rails project

9
Comments 3
3 min read
Best Practices for Cybersecurity in the Digital Age

Best Practices for Cybersecurity in the Digital Age

1
Comments 1
4 min read
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works

Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works

69
Comments 3
5 min read
NIST Cybersecurity Framework for Cybersecurity Beginners

NIST Cybersecurity Framework for Cybersecurity Beginners

3
Comments
6 min read
Is WordPress safe? Or why website security should be handled carefully

Is WordPress safe? Or why website security should be handled carefully

1
Comments
3 min read
GitLab Outage vs. Continuous Code Development

GitLab Outage vs. Continuous Code Development

Comments
4 min read
New Advanced Firewall Control: Enabling enterprise connectivity with IP proxies

New Advanced Firewall Control: Enabling enterprise connectivity with IP proxies

Comments
4 min read
Controlling access to resources with Cognito groups and IAM roles

Controlling access to resources with Cognito groups and IAM roles

4
Comments
8 min read
Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

27
Comments 1
2 min read
loading...