DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is Cyber Security and why is it needed?

What is Cyber Security and why is it needed?

6
Comments 1
4 min read
Diving into AWS - Understanding IAM

Diving into AWS - Understanding IAM

8
Comments 1
8 min read
What's new and noteworthy on AWS - Summer 2023 edition

What's new and noteworthy on AWS - Summer 2023 edition

5
Comments
24 min read
Invisible Banking Trojan learned to use a Rare and Interesting Protocol

Invisible Banking Trojan learned to use a Rare and Interesting Protocol

Comments
1 min read
Restricting access through IAM policies

Restricting access through IAM policies

13
Comments 1
6 min read
5 Essential Data Privacy Regulations for Businesses to Know in 2023

5 Essential Data Privacy Regulations for Businesses to Know in 2023

1
Comments
5 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

16
Comments 3
7 min read
OWASP Top 10 for LLMs

OWASP Top 10 for LLMs

Comments
1 min read
Creating a Private Endpoint for Azure Storage Account using Terraform

Creating a Private Endpoint for Azure Storage Account using Terraform

23
Comments 1
4 min read
A Beginner’s Guide to Authentication and Authorization in Rails

A Beginner’s Guide to Authentication and Authorization in Rails

Comments
10 min read
Two approaches to make your APIs more secure

Two approaches to make your APIs more secure

21
Comments 7
11 min read
Implementing item-level access control to DynamoDB tables

Implementing item-level access control to DynamoDB tables

3
Comments
9 min read
Vault Associate Certification (Part 2): Create Vault policies

Vault Associate Certification (Part 2): Create Vault policies

1
Comments
8 min read
Deploy Authorizer to Handle User Authentication on Koyeb

Deploy Authorizer to Handle User Authentication on Koyeb

Comments
8 min read
CloudDefense.AI helped secure a database that contained entries of over 153,000 users

CloudDefense.AI helped secure a database that contained entries of over 153,000 users

Comments
2 min read
URI vs URL: The real difference between the two

URI vs URL: The real difference between the two

1
Comments
2 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
ZenStack: The Complete Authorization Solution for Prisma Projects

ZenStack: The Complete Authorization Solution for Prisma Projects

29
Comments 2
8 min read
🛡️The Ultimate Defense: Introduction to Spring Security 🔐

🛡️The Ultimate Defense: Introduction to Spring Security 🔐

1
Comments
3 min read
API Security: Error Handling Guide

API Security: Error Handling Guide

2
Comments
4 min read
Password strength detector with machine learning

Password strength detector with machine learning

6
Comments
2 min read
Exploring third-party services with webhooks

Exploring third-party services with webhooks

7
Comments
6 min read
Avoid Smart Contract Hacks with Fuzz Testing

Avoid Smart Contract Hacks with Fuzz Testing

5
Comments
6 min read
Navigating Security and Compliance

Navigating Security and Compliance

9
Comments 2
4 min read
For Devops necessary Tools and Technology

For Devops necessary Tools and Technology

1
Comments
2 min read
What is Devops

What is Devops

1
Comments
2 min read
Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

13
Comments
12 min read
How to Install and Configure Kerberos on Windows 10

How to Install and Configure Kerberos on Windows 10

Comments
2 min read
Why I started writing regularly

Why I started writing regularly

22
Comments 7
4 min read
What is an OSPO and why is it important?

What is an OSPO and why is it important?

3
Comments
10 min read
Safeguarding Your Digital World: The Imperative of Data Security

Safeguarding Your Digital World: The Imperative of Data Security

1
Comments
3 min read
Autenticação e Autorização de uma ASP .NET Web API com Keycloak

Autenticação e Autorização de uma ASP .NET Web API com Keycloak

183
Comments 6
9 min read
Using Technology to Enhance Bitcoin Tracing

Using Technology to Enhance Bitcoin Tracing

3
Comments 2
2 min read
Guide to Generating SSL Certificates Using OpenSSL for Web Applications

Guide to Generating SSL Certificates Using OpenSSL for Web Applications

1
Comments
2 min read
Vault Associate Certification (Part 1): Compare authentication methods

Vault Associate Certification (Part 1): Compare authentication methods

3
Comments 1
11 min read
How To Install Private Git Hosted Dependencies Inside Docker Image Using SSH

How To Install Private Git Hosted Dependencies Inside Docker Image Using SSH

9
Comments 2
2 min read
Using Laravel Policy with middleware to protect routes

Using Laravel Policy with middleware to protect routes

2
Comments 2
2 min read
Demystifying Malware: Types, Detection, and Prevention Techniques

Demystifying Malware: Types, Detection, and Prevention Techniques

Comments
7 min read
An Introduction for Developers to Information Security

An Introduction for Developers to Information Security

4
Comments
6 min read
Simplifying Servlet Security: Keeping Your Web Apps Safe

Simplifying Servlet Security: Keeping Your Web Apps Safe

1
Comments
4 min read
Session Manager: SSH to EC2 Instances Securely

Session Manager: SSH to EC2 Instances Securely

9
Comments
6 min read
Building a Secure and Compliant Message Center with React & DataMotion

Building a Secure and Compliant Message Center with React & DataMotion

3
Comments
5 min read
Best Practices for Cybersecurity in the Digital Age

Best Practices for Cybersecurity in the Digital Age

1
Comments 1
4 min read
Setting up Bcrypt in your Rails project

Setting up Bcrypt in your Rails project

9
Comments 3
3 min read
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works

Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works

70
Comments 3
5 min read
NIST Cybersecurity Framework for Cybersecurity Beginners

NIST Cybersecurity Framework for Cybersecurity Beginners

3
Comments
6 min read
Is WordPress safe? Or why website security should be handled carefully

Is WordPress safe? Or why website security should be handled carefully

1
Comments
3 min read
GitLab Outage vs. Continuous Code Development

GitLab Outage vs. Continuous Code Development

Comments
4 min read
New Advanced Firewall Control: Enabling enterprise connectivity with IP proxies

New Advanced Firewall Control: Enabling enterprise connectivity with IP proxies

Comments
4 min read
Controlling access to resources with Cognito groups and IAM roles

Controlling access to resources with Cognito groups and IAM roles

4
Comments
8 min read
Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.

27
Comments 1
2 min read
Q2 2023 update - Web resources tracker

Q2 2023 update - Web resources tracker

5
Comments
3 min read
The Use of Biometrics as a Cybersecurity Method

The Use of Biometrics as a Cybersecurity Method

5
Comments
8 min read
Managing Multiple AWS Accounts with Organizations and Control Tower

Managing Multiple AWS Accounts with Organizations and Control Tower

9
Comments
3 min read
Automating AWS Prowler Scans

Automating AWS Prowler Scans

2
Comments 1
9 min read
Serving Content from S3 Only to Authenticated Users

Serving Content from S3 Only to Authenticated Users

16
Comments 2
12 min read
Securing Microservices with AWS Cognito

Securing Microservices with AWS Cognito

15
Comments
11 min read
Shielding Your Instances with Private Subnets on AWS

Shielding Your Instances with Private Subnets on AWS

6
Comments 3
20 min read
The Complete Guide to Becoming a Web Developer: Part 8

The Complete Guide to Becoming a Web Developer: Part 8

7
Comments
31 min read
Tesla’s Massive 2023 Data Breach - Could Chaos Security Engineering Have Prevented This?

Tesla’s Massive 2023 Data Breach - Could Chaos Security Engineering Have Prevented This?

7
Comments
3 min read
loading...