DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Track AWS IAM changes in Git

Track AWS IAM changes in Git

Comments
1 min read
A Go net.Listen() function that includes SSO, AuthZ, sessions Management and Anycast

A Go net.Listen() function that includes SSO, AuthZ, sessions Management and Anycast

4
Comments
5 min read
Introduction to Cloud I AM:Can I come in? Access Control in Google Cloud

Introduction to Cloud I AM:Can I come in? Access Control in Google Cloud

1
Comments
2 min read
Is CentOS still relevant today?

Is CentOS still relevant today?

5
Comments 3
3 min read
Enhancing Security Vigilance: Education and Continuous Oversight

Enhancing Security Vigilance: Education and Continuous Oversight

1
Comments
4 min read
Advanced Surveillance: Pioneering Real-Time Vigilance

Advanced Surveillance: Pioneering Real-Time Vigilance

Comments
3 min read
Unified Security Frameworks: A Synergistic Shield

Unified Security Frameworks: A Synergistic Shield

Comments
3 min read
Safeguarding the Digital Realm: Enhancing Cybersecurity for Access Control and Security Cameras

Safeguarding the Digital Realm: Enhancing Cybersecurity for Access Control and Security Cameras

1
Comments
3 min read
Envisioning Tomorrow's Security: Anticipating Emerging Strategies and Innovations in Unauthorized Access Prevention

Envisioning Tomorrow's Security: Anticipating Emerging Strategies and Innovations in Unauthorized Access Prevention

Comments
4 min read
Orchestrating Secure Environments: Strategy and Implementation

Orchestrating Secure Environments: Strategy and Implementation

1
Comments
3 min read
Unlocking the Power of Security Cameras for Preventing Unauthorized Access

Unlocking the Power of Security Cameras for Preventing Unauthorized Access

Comments
3 min read
Desvendando a criptografia do Firefox e resgatando senhas salvas!

Desvendando a criptografia do Firefox e resgatando senhas salvas!

1
Comments
3 min read
Perl script to search for large primes

Perl script to search for large primes

1
Comments
1 min read
🛡️ Policy Engines: Open Policy Agent vs AWS Cedar vs Google Zanzibar 𐃃🌲፨

🛡️ Policy Engines: Open Policy Agent vs AWS Cedar vs Google Zanzibar 𐃃🌲፨

1
Comments
6 min read
Use Case: Monitor SSH attempts for your EC2 Instance

Use Case: Monitor SSH attempts for your EC2 Instance

1
Comments
4 min read
7 Must-Do Security Best Practices for your AWS Account

7 Must-Do Security Best Practices for your AWS Account

24
Comments 6
9 min read
Security configuration management for software engineers

Security configuration management for software engineers

5
Comments
5 min read
What is a Checksum? A Guide to Using the cksum Command in Linux to Verify File Modifications

What is a Checksum? A Guide to Using the cksum Command in Linux to Verify File Modifications

5
Comments
3 min read
ENCRYPTION BY AWS KMS SERVICE

ENCRYPTION BY AWS KMS SERVICE

Comments
7 min read
Programmatically reacting to S3 bucket external access exposures

Programmatically reacting to S3 bucket external access exposures

1
Comments
8 min read
Secure Your AWS Environments with Terraform, Vault, and Veeam

Secure Your AWS Environments with Terraform, Vault, and Veeam

Comments
7 min read
Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Comments
10 min read
DefaultAzureCredential with certificate-based authentication: how to make it work

DefaultAzureCredential with certificate-based authentication: how to make it work

7
Comments
5 min read
Introducing Fuzzing with Alexandre

Introducing Fuzzing with Alexandre

5
Comments
12 min read
Authentication Orientation

Authentication Orientation

2
Comments
5 min read
Does a one-man project need a formal project management process?

Does a one-man project need a formal project management process?

6
Comments
5 min read
IAM Users vs Roles

IAM Users vs Roles

4
Comments
12 min read
Passkeys vs Passwords: The Future of Digital Authentication

Passkeys vs Passwords: The Future of Digital Authentication

Comments
3 min read
Running Secutils.dev micro-SaaS for less than 1€ a month

Running Secutils.dev micro-SaaS for less than 1€ a month

7
Comments 2
8 min read
Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples

Securing Your Node.js Apps by Analyzing Real-World Command Injection Examples

2
Comments 1
6 min read
Understanding OAuth 2.0

Understanding OAuth 2.0

Comments
1 min read
Install free SSL certificate on your server using Certbot

Install free SSL certificate on your server using Certbot

12
Comments
5 min read
Ensuring Compliance with Custom AWS Config Rules

Ensuring Compliance with Custom AWS Config Rules

5
Comments
5 min read
Learn to Protect Passwords with Bcrypt Hash in a Few Minutes

Learn to Protect Passwords with Bcrypt Hash in a Few Minutes

17
Comments 4
4 min read
Types of Internet Proxies

Types of Internet Proxies

6
Comments 2
1 min read
Integrate security testing into your development cycle with Foundry and Diligence Fuzzing

Integrate security testing into your development cycle with Foundry and Diligence Fuzzing

1
Comments
5 min read
IAM Permissions Boundaries

IAM Permissions Boundaries

1
Comments
3 min read
Mastering Databases: From Fundamentals to Advanced Concepts

Mastering Databases: From Fundamentals to Advanced Concepts

1
Comments
4 min read
How to use hCAPTCHA with Iris

How to use hCAPTCHA with Iris

Comments
3 min read
Privacy-friendly usage analytics and monitoring for Secutils.dev

Privacy-friendly usage analytics and monitoring for Secutils.dev

5
Comments
4 min read
Embarking on the Cybersecurity Journey: A Beginner’s Guide

Embarking on the Cybersecurity Journey: A Beginner’s Guide

5
Comments
3 min read
Signing files with digital certificate

Signing files with digital certificate

8
Comments
2 min read
Introducing Goctopus: open-source, state-of-the-art GraphQL endpoint discovery & fingerprinting tool.

Introducing Goctopus: open-source, state-of-the-art GraphQL endpoint discovery & fingerprinting tool.

14
Comments 2
6 min read
Receiving Slack notifications when CloudTrail logging gets turned off

Receiving Slack notifications when CloudTrail logging gets turned off

7
Comments
7 min read
Deployment overview of micro-cluster for Secutils.dev micro-SaaS

Deployment overview of micro-cluster for Secutils.dev micro-SaaS

5
Comments
4 min read
Storing server logs on CrateDB for fast search and aggregations

Storing server logs on CrateDB for fast search and aggregations

2
Comments
3 min read
Secure Coding 101: How to Read and Write Files Securely

Secure Coding 101: How to Read and Write Files Securely

2
Comments
5 min read
Secure Code Review Best Practices [cheat sheet included]

Secure Code Review Best Practices [cheat sheet included]

3
Comments
6 min read
CCTV Cameras: The Linchpin of Robust Security

CCTV Cameras: The Linchpin of Robust Security

1
Comments 1
4 min read
Create Your Own Local Root CA With Yubikey Signing

Create Your Own Local Root CA With Yubikey Signing

11
Comments 2
16 min read
Publish Azure DevOps Extensions using Azure Workload Identity

Publish Azure DevOps Extensions using Azure Workload Identity

6
Comments
8 min read
Encrypting Sensitive Data in Rails 7 with Encrypted Attributes

Encrypting Sensitive Data in Rails 7 with Encrypted Attributes

7
Comments
4 min read
Secutils.dev technology stack overview

Secutils.dev technology stack overview

6
Comments
6 min read
Web Environment Integrity: Google strikes again

Web Environment Integrity: Google strikes again

30
Comments 4
5 min read
How Your Secrets Management Maturity Can Impact Your DevOps Research and Assessment Metrics

How Your Secrets Management Maturity Can Impact Your DevOps Research and Assessment Metrics

Comments
5 min read
Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls

Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls

7
Comments 1
2 min read
New Relic Interactive Application Security Testing (IAST) - Data Sheet

New Relic Interactive Application Security Testing (IAST) - Data Sheet

2
Comments
1 min read
Docker Security: Clair

Docker Security: Clair

13
Comments
6 min read
Reset centOS root password

Reset centOS root password

3
Comments
1 min read
Why I Developed an AWS WAF Log Analysis Tool

Why I Developed an AWS WAF Log Analysis Tool

2
Comments 1
3 min read
loading...