DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

27
Comments 1
2 min read
Q2 2023 update - Web resources tracker

Q2 2023 update - Web resources tracker

5
Comments
3 min read
The Use of Biometrics as a Cybersecurity Method

The Use of Biometrics as a Cybersecurity Method

5
Comments
8 min read
Managing Multiple AWS Accounts with Organizations and Control Tower

Managing Multiple AWS Accounts with Organizations and Control Tower

9
Comments
3 min read
Automating AWS Prowler Scans

Automating AWS Prowler Scans

2
Comments 1
9 min read
Serving Content from S3 Only to Authenticated Users

Serving Content from S3 Only to Authenticated Users

16
Comments 2
12 min read
Securing Microservices with AWS Cognito

Securing Microservices with AWS Cognito

15
Comments
11 min read
Shielding Your Instances with Private Subnets on AWS

Shielding Your Instances with Private Subnets on AWS

6
Comments 3
20 min read
The Complete Guide to Becoming a Web Developer: Part 8

The Complete Guide to Becoming a Web Developer: Part 8

7
Comments
31 min read
Tesla’s Massive 2023 Data Breach - Could Chaos Security Engineering Have Prevented This?

Tesla’s Massive 2023 Data Breach - Could Chaos Security Engineering Have Prevented This?

7
Comments
3 min read
Track AWS IAM changes in Git

Track AWS IAM changes in Git

Comments
1 min read
A Go net.Listen() function that includes SSO, AuthZ, sessions Management and Anycast

A Go net.Listen() function that includes SSO, AuthZ, sessions Management and Anycast

4
Comments
5 min read
Introduction to Cloud I AM:Can I come in? Access Control in Google Cloud

Introduction to Cloud I AM:Can I come in? Access Control in Google Cloud

1
Comments
2 min read
Is CentOS still relevant today?

Is CentOS still relevant today?

5
Comments 3
3 min read
Enhancing Security Vigilance: Education and Continuous Oversight

Enhancing Security Vigilance: Education and Continuous Oversight

1
Comments
4 min read
Advanced Surveillance: Pioneering Real-Time Vigilance

Advanced Surveillance: Pioneering Real-Time Vigilance

Comments
3 min read
Unified Security Frameworks: A Synergistic Shield

Unified Security Frameworks: A Synergistic Shield

Comments
3 min read
Safeguarding the Digital Realm: Enhancing Cybersecurity for Access Control and Security Cameras

Safeguarding the Digital Realm: Enhancing Cybersecurity for Access Control and Security Cameras

1
Comments
3 min read
Envisioning Tomorrow's Security: Anticipating Emerging Strategies and Innovations in Unauthorized Access Prevention

Envisioning Tomorrow's Security: Anticipating Emerging Strategies and Innovations in Unauthorized Access Prevention

Comments
4 min read
Orchestrating Secure Environments: Strategy and Implementation

Orchestrating Secure Environments: Strategy and Implementation

1
Comments
3 min read
Unlocking the Power of Security Cameras for Preventing Unauthorized Access

Unlocking the Power of Security Cameras for Preventing Unauthorized Access

Comments
3 min read
Desvendando a criptografia do Firefox e resgatando senhas salvas!

Desvendando a criptografia do Firefox e resgatando senhas salvas!

1
Comments
3 min read
Perl script to search for large primes

Perl script to search for large primes

1
Comments
1 min read
🛡️ Policy Engines: Open Policy Agent vs AWS Cedar vs Google Zanzibar 𐃃🌲፨

🛡️ Policy Engines: Open Policy Agent vs AWS Cedar vs Google Zanzibar 𐃃🌲፨

1
Comments
6 min read
Use Case: Monitor SSH attempts for your EC2 Instance

Use Case: Monitor SSH attempts for your EC2 Instance

1
Comments
4 min read
7 Must-Do Security Best Practices for your AWS Account

7 Must-Do Security Best Practices for your AWS Account

24
Comments 6
9 min read
Security configuration management for software engineers

Security configuration management for software engineers

5
Comments
5 min read
What is a Checksum? A Guide to Using the cksum Command in Linux to Verify File Modifications

What is a Checksum? A Guide to Using the cksum Command in Linux to Verify File Modifications

5
Comments
3 min read
ENCRYPTION BY AWS KMS SERVICE

ENCRYPTION BY AWS KMS SERVICE

Comments
7 min read
Programmatically reacting to S3 bucket external access exposures

Programmatically reacting to S3 bucket external access exposures

1
Comments
8 min read
Secure Your AWS Environments with Terraform, Vault, and Veeam

Secure Your AWS Environments with Terraform, Vault, and Veeam

Comments
7 min read
Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Comments
10 min read
DefaultAzureCredential with certificate-based authentication: how to make it work

DefaultAzureCredential with certificate-based authentication: how to make it work

7
Comments
5 min read
Introducing Fuzzing with Alexandre

Introducing Fuzzing with Alexandre

5
Comments
12 min read
Authentication Orientation

Authentication Orientation

2
Comments
5 min read
Does a one-man project need a formal project management process?

Does a one-man project need a formal project management process?

6
Comments
5 min read
IAM Users vs Roles

IAM Users vs Roles

4
Comments
12 min read
Passkeys vs Passwords: The Future of Digital Authentication

Passkeys vs Passwords: The Future of Digital Authentication

Comments
3 min read
Running Secutils.dev micro-SaaS for less than 1€ a month

Running Secutils.dev micro-SaaS for less than 1€ a month

7
Comments 2
8 min read
Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples

Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples

2
Comments 1
6 min read
Understanding OAuth 2.0

Understanding OAuth 2.0

Comments
1 min read
Install free SSL certificate on your server using Certbot

Install free SSL certificate on your server using Certbot

12
Comments
5 min read
Ensuring Compliance with Custom AWS Config Rules

Ensuring Compliance with Custom AWS Config Rules

5
Comments
5 min read
Learn to Protect Passwords with Bcrypt Hash in a Few Minutes

Learn to Protect Passwords with Bcrypt Hash in a Few Minutes

17
Comments 4
4 min read
Types of Internet Proxies

Types of Internet Proxies

6
Comments 2
1 min read
Integrate security testing into your development cycle with Foundry and Diligence Fuzzing

Integrate security testing into your development cycle with Foundry and Diligence Fuzzing

1
Comments
5 min read
IAM Permissions Boundaries

IAM Permissions Boundaries

1
Comments
3 min read
Mastering Databases: From Fundamentals to Advanced Concepts

Mastering Databases: From Fundamentals to Advanced Concepts

1
Comments
4 min read
How to use hCAPTCHA with Iris

How to use hCAPTCHA with Iris

Comments
3 min read
Privacy-friendly usage analytics and monitoring for Secutils.dev

Privacy-friendly usage analytics and monitoring for Secutils.dev

5
Comments
4 min read
Embarking on the Cybersecurity Journey: A Beginner’s Guide

Embarking on the Cybersecurity Journey: A Beginner’s Guide

5
Comments
3 min read
Signing files with digital certificate

Signing files with digital certificate

8
Comments
2 min read
Introducing Goctopus: open-source, state-of-the-art GraphQL endpoint discovery & fingerprinting tool.

Introducing Goctopus: open-source, state-of-the-art GraphQL endpoint discovery & fingerprinting tool.

14
Comments 2
6 min read
Receiving Slack notifications when CloudTrail logging gets turned off

Receiving Slack notifications when CloudTrail logging gets turned off

7
Comments
7 min read
Deployment overview of micro-cluster for Secutils.dev micro-SaaS

Deployment overview of micro-cluster for Secutils.dev micro-SaaS

5
Comments
4 min read
Storing server logs on CrateDB for fast search and aggregations

Storing server logs on CrateDB for fast search and aggregations

2
Comments
3 min read
Secure Coding 101: How to Read and Write Files Securely

Secure Coding 101: How to Read and Write Files Securely

2
Comments
5 min read
Secure Code Review Best Practices [cheat sheet included]

Secure Code Review Best Practices [cheat sheet included]

4
Comments
6 min read
CCTV Cameras: The Linchpin of Robust Security

CCTV Cameras: The Linchpin of Robust Security

1
Comments 1
4 min read
Create Your Own Local Root CA With Yubikey Signing

Create Your Own Local Root CA With Yubikey Signing

10
Comments 2
16 min read
loading...