DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Enforce MFA on the Azure Portal using Conditional Access

Enforce MFA on the Azure Portal using Conditional Access

9
Comments
3 min read
OWASP Top 10 for Developers: Insufficient Logging and Monitoring

OWASP Top 10 for Developers: Insufficient Logging and Monitoring

3
Comments
6 min read
Cultivating a Security Focused Development Team

Cultivating a Security Focused Development Team

4
Comments
7 min read
Configuring Azure VM’s security groups to allow web-access via your web browser.

Configuring Azure VM’s security groups to allow web-access via your web browser.

4
Comments
3 min read
Use GoAccess To Analyze HAProxy Logs

Use GoAccess To Analyze HAProxy Logs

13
Comments
4 min read
The Complete Guide to Angular Security

The Complete Guide to Angular Security

10
Comments
1 min read
How to make the Firebase Realtime Database Rules Secure for a Blog

How to make the Firebase Realtime Database Rules Secure for a Blog

7
Comments 2
3 min read
How I exploited NPM downloads... and why you shouldn't trust them

How I exploited NPM downloads... and why you shouldn't trust them

117
Comments 12
5 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

83
Comments
10 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

12
Comments
12 min read
A privacy guide for the data tracking era

A privacy guide for the data tracking era

8
Comments 1
5 min read
Simplified: Authentication & Authorization

Simplified: Authentication & Authorization

5
Comments
1 min read
Hardening and Simplifying Python's urlopen

Hardening and Simplifying Python's urlopen

5
Comments
4 min read
How to use UUIDs in URLs in Laravel

How to use UUIDs in URLs in Laravel

12
Comments 3
2 min read
The 14 Financial Impacts of a Cyber Attack 💸

The 14 Financial Impacts of a Cyber Attack 💸

1
Comments
1 min read
How To Generate Strong Passwords Using Python

How To Generate Strong Passwords Using Python

30
Comments 5
2 min read
Subdomain Takeover: Ignore This Vulnerability at Your Peril

Subdomain Takeover: Ignore This Vulnerability at Your Peril

9
Comments
11 min read
Microservices End to End In-transit Encryption on EKS with Istio & ACM

Microservices End to End In-transit Encryption on EKS with Istio & ACM

11
Comments 1
6 min read
rego.fyi: A Study in Serverless Authorization with Open Policy Agent

rego.fyi: A Study in Serverless Authorization with Open Policy Agent

16
Comments 3
11 min read
The ultimate guide to Yubikey on WSL2 [Part 4]

The ultimate guide to Yubikey on WSL2 [Part 4]

8
Comments 4
2 min read
Generate AWS Temporary Credential And Add It As A Profile

Generate AWS Temporary Credential And Add It As A Profile

5
Comments
2 min read
File Encrypter and Decrypter

File Encrypter and Decrypter

7
Comments
3 min read
DevOps Engineer Resume: Here's mine as an example

DevOps Engineer Resume: Here's mine as an example

23
Comments
5 min read
Why you shouldn't expose your incrementing IDs

Why you shouldn't expose your incrementing IDs

9
Comments
3 min read
Building a secure network in AWS (PART 1)

Building a secure network in AWS (PART 1)

6
Comments
5 min read
loading...