DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS CDK: Principle of Least Privilege

AWS CDK: Principle of Least Privilege

8
Comments
3 min read
We've always done it this way

We've always done it this way

Comments
3 min read
Configure Image Automation with Flux

Configure Image Automation with Flux

7
Comments
4 min read
Should we use VPN on browsing?

Should we use VPN on browsing?

Comments
4 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
The cost of false positives in software security, Part 1: Small applications

The cost of false positives in software security, Part 1: Small applications

5
Comments
6 min read
Automating Kubernetes Deployments with Flux

Automating Kubernetes Deployments with Flux

15
Comments
5 min read
How to Secure Vercel Cron Job routes in NextJS 13

How to Secure Vercel Cron Job routes in NextJS 13

2
Comments
3 min read
Security Token Offering (STO) Platform - Revolutionizing Fundraising

Security Token Offering (STO) Platform - Revolutionizing Fundraising

5
Comments
3 min read
Top 10 Hackers

Top 10 Hackers

11
Comments 11
9 min read
How to Detect Online Fraud and Protect Yourself Against Identity Theft

How to Detect Online Fraud and Protect Yourself Against Identity Theft

2
Comments
6 min read
Security Best Practices For GitHub Actions Secrets

Security Best Practices For GitHub Actions Secrets

7
Comments 3
5 min read
Software Supply Chain Security for Python Developers - Part 2

Software Supply Chain Security for Python Developers - Part 2

Comments
5 min read
An Introduction to Software Supply Chains for Python Developers - Part 1

An Introduction to Software Supply Chains for Python Developers - Part 1

1
Comments
4 min read
Security Tips: Metadata

Security Tips: Metadata

Comments
6 min read
50 Essential Linux Server Security Hardening Tips

50 Essential Linux Server Security Hardening Tips

4
Comments
8 min read
Cybersecurity In The World Of Generative AI

Cybersecurity In The World Of Generative AI

1
Comments 2
2 min read
Navigating CAA DNS Records with AWS: A Deep Dive

Navigating CAA DNS Records with AWS: A Deep Dive

2
Comments
3 min read
WebSocket security: 9 common vulnerabilities & prevention methods

WebSocket security: 9 common vulnerabilities & prevention methods

6
Comments
13 min read
Fortify Your Database: Supabase's Row Level Security

Fortify Your Database: Supabase's Row Level Security

2
Comments
3 min read
Firebase & PowerShell Execution Policy

Firebase & PowerShell Execution Policy

1
Comments
3 min read
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2

Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2

Comments
4 min read
Why you need Interactive Application Security Testing (IAST) đź”’

Why you need Interactive Application Security Testing (IAST) đź”’

Comments
1 min read
Using Content Security Policy headers with React & emotion

Using Content Security Policy headers with React & emotion

47
Comments 4
3 min read
Security Vulnerabilities Developers Needed to Know

Security Vulnerabilities Developers Needed to Know

Comments
9 min read
AWS WAF Implementation Guide: Setting Up with Terraform for Enhanced Security

AWS WAF Implementation Guide: Setting Up with Terraform for Enhanced Security

10
Comments
4 min read
How easy is it to steal credentials from Jenkins with Commit Access?

How easy is it to steal credentials from Jenkins with Commit Access?

11
Comments
6 min read
Enhancing Application Security with DDoS Simulation Testing in AWS

Enhancing Application Security with DDoS Simulation Testing in AWS

2
Comments
7 min read
Everything People Don't Get About CVEs

Everything People Don't Get About CVEs

2
Comments
6 min read
Securing Apache Age: Best Practices for Protecting Your Graph Data

Securing Apache Age: Best Practices for Protecting Your Graph Data

Comments
3 min read
AWS Secrets Manager vs. Systems Manager Parameter Store - Choosing the Right Solution for Your Needs

AWS Secrets Manager vs. Systems Manager Parameter Store - Choosing the Right Solution for Your Needs

20
Comments
5 min read
Internet Anonymity 101: The Ultimate Guide for Staying Anonymous Online

Internet Anonymity 101: The Ultimate Guide for Staying Anonymous Online

Comments
4 min read
Using JLink to create smaller Docker images for your Spring Boot Java application

Using JLink to create smaller Docker images for your Spring Boot Java application

3
Comments
6 min read
Unraveling the Mystery of Prompt Injection with OpenAI's Models

Unraveling the Mystery of Prompt Injection with OpenAI's Models

2
Comments
3 min read
Authenticating users in the load balancer with Cognito

Authenticating users in the load balancer with Cognito

7
Comments
6 min read
Synthetic Monitoring Metrics: What are the Key Performance Insights?

Synthetic Monitoring Metrics: What are the Key Performance Insights?

Comments
6 min read
Click, Install, Browse: Easy Security Extensions for Everyone

Click, Install, Browse: Easy Security Extensions for Everyone

4
Comments
4 min read
Xecrets File Command Line cryptographic toolbox for Windows, macOS and Linux

Xecrets File Command Line cryptographic toolbox for Windows, macOS and Linux

1
Comments
1 min read
🦠 Malware Demystified: Navigating the Digital Threat Landscape

🦠 Malware Demystified: Navigating the Digital Threat Landscape

6
Comments 1
3 min read
Top 5 WordPress Security Threats

Top 5 WordPress Security Threats

5
Comments
2 min read
Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Compromised Credentials Leading Cause Of Initial Attack Access: Findings from the Sophos 2023 Active Adversary Report

Comments
8 min read
What is Linux and Why Do Hackers Use It?

What is Linux and Why Do Hackers Use It?

3
Comments 2
3 min read
Práticas Recomendadas de Segurança para Aplicações React

Práticas Recomendadas de Segurança para Aplicações React

2
Comments
3 min read
Exploring AWS Security vs Azure Security: A Comprehensive Guide for 2023

Exploring AWS Security vs Azure Security: A Comprehensive Guide for 2023

3
Comments
19 min read
The Data Cloud’s Cheese and Diamond Problem

The Data Cloud’s Cheese and Diamond Problem

14
Comments
9 min read
What the heck is Token-Based Authentication?

What the heck is Token-Based Authentication?

7
Comments
3 min read
đź“ťUnveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

đź“ťUnveiling the OWASP Top 10 2021: Your Epic Journey into the Abyss of Web App Security Risks

5
Comments 2
4 min read
Perl Stream Cipher

Perl Stream Cipher

1
Comments
1 min read
Account Abstraction

Account Abstraction

2
Comments
2 min read
PHP PDO : PHP Data Object

PHP PDO : PHP Data Object

2
Comments
4 min read
Exploring Blockchain's Role in the Metaverse

Exploring Blockchain's Role in the Metaverse

Comments
3 min read
Power Apps - Security Review

Power Apps - Security Review

26
Comments 3
5 min read
Online Security - A Simple Guide

Online Security - A Simple Guide

Comments
4 min read
Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

Exploring Authentication Strategies in Microfrontends: A Deep Dive into BFF Authorization and Frontend Silent Login

143
Comments 5
6 min read
Mastering Nmap: A Comprehensive Guide

Mastering Nmap: A Comprehensive Guide

3
Comments
4 min read
Implementing access control on API Gateway endpoints with ID tokens

Implementing access control on API Gateway endpoints with ID tokens

19
Comments
7 min read
Vault Associate Certification (Part 10): Explain encryption as a service

Vault Associate Certification (Part 10): Explain encryption as a service

1
Comments
4 min read
Protect the repository hosting your GitHub Action

Protect the repository hosting your GitHub Action

6
Comments
7 min read
Vault Associate Certification (Part 9): Explain Vault architecture

Vault Associate Certification (Part 9): Explain Vault architecture

3
Comments
18 min read
Is JWT Safe When Anyone Can Decode Plain Text Claims

Is JWT Safe When Anyone Can Decode Plain Text Claims

3
Comments
3 min read
loading...