DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Publish Azure DevOps Extensions using Azure Workload Identity

Publish Azure DevOps Extensions using Azure Workload Identity

6
Comments
8 min read
Encrypting Sensitive Data in Rails 7 with Encrypted Attributes

Encrypting Sensitive Data in Rails 7 with Encrypted Attributes

7
Comments
4 min read
Secutils.dev technology stack overview

Secutils.dev technology stack overview

6
Comments
6 min read
Web Environment Integrity: Google strikes again

Web Environment Integrity: Google strikes again

30
Comments 4
5 min read
How Your Secrets Management Maturity Can Impact Your DevOps Research and Assessment Metrics

How Your Secrets Management Maturity Can Impact Your DevOps Research and Assessment Metrics

Comments
5 min read
Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls

Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls

7
Comments 1
2 min read
New Relic Interactive Application Security Testing (IAST) - Data Sheet

New Relic Interactive Application Security Testing (IAST) - Data Sheet

2
Comments
1 min read
Docker Security: Clair

Docker Security: Clair

12
Comments
6 min read
Reset centOS root password

Reset centOS root password

3
Comments
1 min read
Why I Developed an AWS WAF Log Analysis Tool

Why I Developed an AWS WAF Log Analysis Tool

2
Comments 1
3 min read
🪄 Migrating from RBAC to ABAC with Permit.io 🐕🤯

🪄 Migrating from RBAC to ABAC with Permit.io 🐕🤯

7
Comments 1
5 min read
Find Source Code Vulnerabilities with CodeQL Before You Commit

Find Source Code Vulnerabilities with CodeQL Before You Commit

15
Comments
4 min read
Secutils.dev beta release is now public

Secutils.dev beta release is now public

7
Comments
2 min read
Tailscale vs WireGuard

Tailscale vs WireGuard

18
Comments 3
5 min read
IPv4 vs. IPv6: Bridging the Digital Divide

IPv4 vs. IPv6: Bridging the Digital Divide

18
Comments 1
3 min read
Decoding Access Control: Unveiling the Secrets of Secure Entry

Decoding Access Control: Unveiling the Secrets of Secure Entry

1
Comments
3 min read
Advancing Security through Access Control Systems

Advancing Security through Access Control Systems

1
Comments
4 min read
SecureCred

SecureCred

3
Comments 2
1 min read
How to Ensure RoR-based App Security Using Best Coding Practices

How to Ensure RoR-based App Security Using Best Coding Practices

2
Comments
6 min read
Vault Associate Certification (Part 0): Hello World

Vault Associate Certification (Part 0): Hello World

4
Comments
10 min read
Easy Encryption In Typescript

Easy Encryption In Typescript

20
Comments 6
5 min read
SAML vs OAuth: Choosing the right protocol for authentication

SAML vs OAuth: Choosing the right protocol for authentication

4
Comments
3 min read
Easy Encryption In Rust

Easy Encryption In Rust

2
Comments
3 min read
What's A Security Concept You Struggle With?

What's A Security Concept You Struggle With?

3
Comments
1 min read
Understanding MPC Wallets: Enhancing Security and Privacy in Cryptocurrency Management

Understanding MPC Wallets: Enhancing Security and Privacy in Cryptocurrency Management

1
Comments
12 min read
Steganography: Part 2 - Advanced LSB

Steganography: Part 2 - Advanced LSB

2
Comments 3
5 min read
Me, Penetrating their defenses

Me, Penetrating their defenses

Comments
6 min read
Demystifying the magic of Zero Trust with my daughter and opensource

Demystifying the magic of Zero Trust with my daughter and opensource

Comments
4 min read
GitHub's Push Protection: Enhancing Open-Source Security with Limitations to Consider

GitHub's Push Protection: Enhancing Open-Source Security with Limitations to Consider

Comments
7 min read
AWS Landing Zone setup through AWS Control Tower

AWS Landing Zone setup through AWS Control Tower

Comments
5 min read
SQL injection in Rails - Learn from an attacker’s shoes

SQL injection in Rails - Learn from an attacker’s shoes

4
Comments
6 min read
Create digital certificate

Create digital certificate

7
Comments
3 min read
How I unsuccessfully tried to recover my lost password

How I unsuccessfully tried to recover my lost password

7
Comments 2
12 min read
KubeClarity in Action - Image Scanning as part of your CI workflow

KubeClarity in Action - Image Scanning as part of your CI workflow

2
Comments
6 min read
Yes! OpenTelemetry is a Critical Part of Securing Your Systems

Yes! OpenTelemetry is a Critical Part of Securing Your Systems

3
Comments
7 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

Comments
3 min read
Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

1
Comments
5 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

2
Comments
3 min read
[GameDev] Unity3D, C# and String Security

[GameDev] Unity3D, C# and String Security

2
Comments 1
14 min read
Understanding AWS WAF Pricing

Understanding AWS WAF Pricing

6
Comments 2
6 min read
Increase AWS Security Posture with IAM Roles and Policies

Increase AWS Security Posture with IAM Roles and Policies

7
Comments 1
8 min read
Avoiding Common Mistakes in Cloud Architecture Design Interviews

Avoiding Common Mistakes in Cloud Architecture Design Interviews

6
Comments 2
3 min read
Reproducible Builds for Supply Chain Security

Reproducible Builds for Supply Chain Security

1
Comments
6 min read
Use Tetragon to Limit Network Usage for a set of Binary

Use Tetragon to Limit Network Usage for a set of Binary

5
Comments 1
6 min read
Lenient scope search in Cerbos policies

Lenient scope search in Cerbos policies

3
Comments
3 min read
Should You Roll Your Own RBAC Authorization?

Should You Roll Your Own RBAC Authorization?

6
Comments 3
6 min read
Returning customized content based on location with S3 Object Lambda

Returning customized content based on location with S3 Object Lambda

2
Comments
9 min read
Google Zanzibar vs OPA - Graph vs. Code Based Authorization

Google Zanzibar vs OPA - Graph vs. Code Based Authorization

Comments
5 min read
A Comprehensive Guide to Deep links and App Links in Android

A Comprehensive Guide to Deep links and App Links in Android

1
Comments
3 min read
Improve your app by using validations

Improve your app by using validations

Comments
1 min read
Mejora tu aplicación usando validaciones

Mejora tu aplicación usando validaciones

Comments
1 min read
Secure Your JavaScript Project with 'npm audit'!

Secure Your JavaScript Project with 'npm audit'!

4
Comments 1
2 min read
A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

Comments
8 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Secure GraphQL Microservices

Secure GraphQL Microservices

3
Comments
5 min read
Broken Access Control: What Is It and Why Does It Matter in your Rails application?

Broken Access Control: What Is It and Why Does It Matter in your Rails application?

5
Comments
8 min read
Tailscale vs ZeroTier

Tailscale vs ZeroTier

61
Comments 2
5 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

31
Comments 2
12 min read
How TLS / mTLS handshakes Work?

How TLS / mTLS handshakes Work?

5
Comments
2 min read
How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

8
Comments 2
3 min read
loading...