DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Efficient Data Management with Frozen Shards Decider in Elastic-search

Efficient Data Management with Frozen Shards Decider in Elastic-search

2
Comments 1
3 min read
Amazon CodeGuru Reviewer: already time for retirement?

Amazon CodeGuru Reviewer: already time for retirement?

Comments
7 min read
Migrating users without downtime in your service (The Lazy Migration Strategy)

Migrating users without downtime in your service (The Lazy Migration Strategy)

1
Comments
5 min read
Vulnerability Scanning

Vulnerability Scanning

1
Comments
2 min read
How SMS Fraud Works and How to Guard Against It

How SMS Fraud Works and How to Guard Against It

1
Comments
5 min read
Hack The Box Writeup: Emdee Five for Life

Hack The Box Writeup: Emdee Five for Life

Comments
6 min read
Play Microservices: Security

Play Microservices: Security

6
Comments
10 min read
awesome MLSecOps: aka prompt injection is the new SQL injection

awesome MLSecOps: aka prompt injection is the new SQL injection

3
Comments 2
2 min read
5 Strategies for Strengthening MQTT Infrastructure Security

5 Strategies for Strengthening MQTT Infrastructure Security

1
Comments
6 min read
Enhancing AWS Lambda Security with Deno

Enhancing AWS Lambda Security with Deno

1
Comments 3
4 min read
Understanding Authentication & Authorization in Istio

Understanding Authentication & Authorization in Istio

Comments
11 min read
Rational Shift-Left Security for Developers

Rational Shift-Left Security for Developers

2
Comments 1
7 min read
TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

4
Comments 1
4 min read
Programmatically retrieving secrets from Parameter Store and Secrets Manager

Programmatically retrieving secrets from Parameter Store and Secrets Manager

10
Comments
6 min read
True Secrets Auto Rotation with ESO and Vault

True Secrets Auto Rotation with ESO and Vault

14
Comments
7 min read
The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

3
Comments
2 min read
Flexible Policy Composition - Local & Export Variables in Cerbos Policies

Flexible Policy Composition - Local & Export Variables in Cerbos Policies

1
Comments
3 min read
Setting up SSL Certificate with Nginx

Setting up SSL Certificate with Nginx

5
Comments
2 min read
Advanced Secure Node.js Auth with JWT

Advanced Secure Node.js Auth with JWT

26
Comments 1
5 min read
Introduction: Safeguarding Your Spaces in an Interconnected World

Introduction: Safeguarding Your Spaces in an Interconnected World

1
Comments 1
3 min read
Top 5 Featured DEV Tag(#security) Posts from the Past Week

Top 5 Featured DEV Tag(#security) Posts from the Past Week

1
Comments 3
1 min read
JWT desmistificado

JWT desmistificado

3
Comments 1
3 min read
Going Blind to Find the Way (INTIGRITI Challenge 0723)

Going Blind to Find the Way (INTIGRITI Challenge 0723)

4
Comments 1
6 min read
Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

2
Comments
3 min read
Overview of AWS Security Group

Overview of AWS Security Group

13
Comments
3 min read
Guide to pentesting (what, why, and how)

Guide to pentesting (what, why, and how)

1
Comments
3 min read
Top 10 Best Web Application Security Best Practices for Developers to Follow

Top 10 Best Web Application Security Best Practices for Developers to Follow

7
Comments
6 min read
Security Advisory for Tauri 1.4 (CVE-2023-34460)

Security Advisory for Tauri 1.4 (CVE-2023-34460)

6
Comments
3 min read
Configure SSH Keys for Your GitHub Account

Configure SSH Keys for Your GitHub Account

2
Comments
3 min read
BoxyHQ + Cerbos: Merging SSO and Authorization

BoxyHQ + Cerbos: Merging SSO and Authorization

1
Comments
10 min read
Cracking Firefox Encryption and Rescuing Saved Passwords!

Cracking Firefox Encryption and Rescuing Saved Passwords!

17
Comments 1
3 min read
Django - reCaptcha

Django - reCaptcha

10
Comments
4 min read
The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

Comments
2 min read
Understanding Container Security

Understanding Container Security

6
Comments
5 min read
Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Comments
3 min read
Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

11
Comments 2
5 min read
Security🔐 Concerns with Cookies🍪.

Security🔐 Concerns with Cookies🍪.

24
Comments 8
4 min read
Build your own Remote Access VPN to AWS with WireGuard and Netmaker

Build your own Remote Access VPN to AWS with WireGuard and Netmaker

42
Comments 2
4 min read
How to use JWT authentication with Iris

How to use JWT authentication with Iris

Comments
8 min read
RLS of Supabase(PostgreSQL) Is Good, But …🤔

RLS of Supabase(PostgreSQL) Is Good, But …🤔

54
Comments 4
6 min read
Securely downloading encrypted S3 objects using CloudFront

Securely downloading encrypted S3 objects using CloudFront

5
Comments
5 min read
Best Practices for Audit Logs in Cloud Applications

Best Practices for Audit Logs in Cloud Applications

8
Comments 1
8 min read
Unlocking the Secrets of GDPR Compliance in IT Outsourcing

Unlocking the Secrets of GDPR Compliance in IT Outsourcing

15
Comments
10 min read
Deploying Code Safely: Protecting Sensitive Data in Your Projects

Deploying Code Safely: Protecting Sensitive Data in Your Projects

3
Comments
1 min read
Verifiable Random Functions (VRF) with Ruby

Verifiable Random Functions (VRF) with Ruby

11
Comments
5 min read
Server-Side Request Forgery in Rails

Server-Side Request Forgery in Rails

Comments
5 min read
Drawbacks of IP whitelist

Drawbacks of IP whitelist

7
Comments 1
2 min read
Netmaker - WireGuard Made Easy

Netmaker - WireGuard Made Easy

47
Comments 1
2 min read
The evolution of password hashing

The evolution of password hashing

5
Comments
8 min read
Workload Identity GKE - Service account k8s com permissões na GCP

Workload Identity GKE - Service account k8s com permissões na GCP

Comments
3 min read
It depends! Exploring my favourite Renovate features for dependency updates

It depends! Exploring my favourite Renovate features for dependency updates

1
Comments
6 min read
How to Hide Your Network in the AWS Cloud Using NAT Gateway

How to Hide Your Network in the AWS Cloud Using NAT Gateway

16
Comments
3 min read
Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

21
Comments 2
8 min read
Como evitar ataques de injeção de código em aplicações Node.js

Como evitar ataques de injeção de código em aplicações Node.js

Comments
4 min read
A Technical Deep Dive into Veeam Backup for AWS

A Technical Deep Dive into Veeam Backup for AWS

1
Comments
4 min read
The Ethereum Virtual Machine: Fueling the Decentralized Revolution

The Ethereum Virtual Machine: Fueling the Decentralized Revolution

24
Comments 2
13 min read
What is HTTPS and how does it work?

What is HTTPS and how does it work?

36
Comments 8
5 min read
Building Trust in a Trustless World: Decentralized Applications Unveiled

Building Trust in a Trustless World: Decentralized Applications Unveiled

20
Comments 2
10 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

63
Comments 3
4 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

186
Comments 12
4 min read
loading...