DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🪄 Migrating from RBAC to ABAC with Permit.io 🐕🤯

🪄 Migrating from RBAC to ABAC with Permit.io 🐕🤯

7
Comments 1
5 min read
Find Source Code Vulnerabilities with CodeQL Before You Commit

Find Source Code Vulnerabilities with CodeQL Before You Commit

14
Comments
4 min read
Secutils.dev beta release is now public

Secutils.dev beta release is now public

7
Comments
2 min read
Tailscale vs WireGuard

Tailscale vs WireGuard

18
Comments 3
5 min read
IPv4 vs. IPv6: Bridging the Digital Divide

IPv4 vs. IPv6: Bridging the Digital Divide

18
Comments 1
3 min read
Decoding Access Control: Unveiling the Secrets of Secure Entry

Decoding Access Control: Unveiling the Secrets of Secure Entry

1
Comments
3 min read
Advancing Security through Access Control Systems

Advancing Security through Access Control Systems

1
Comments
4 min read
SecureCred

SecureCred

3
Comments 2
1 min read
How to Ensure RoR-based App Security Using Best Coding Practices

How to Ensure RoR-based App Security Using Best Coding Practices

2
Comments
6 min read
Vault Associate Certification (Part 0): Hello World

Vault Associate Certification (Part 0): Hello World

4
Comments
10 min read
Easy Encryption In Typescript

Easy Encryption In Typescript

22
Comments 6
5 min read
SAML vs OAuth: Choosing the right protocol for authentication

SAML vs OAuth: Choosing the right protocol for authentication

4
Comments
3 min read
Easy Encryption In Rust

Easy Encryption In Rust

2
Comments
3 min read
What's A Security Concept You Struggle With?

What's A Security Concept You Struggle With?

3
Comments
1 min read
Understanding MPC Wallets: Enhancing Security and Privacy in Cryptocurrency Management

Understanding MPC Wallets: Enhancing Security and Privacy in Cryptocurrency Management

1
Comments
12 min read
Steganography: Part 2 - Advanced LSB

Steganography: Part 2 - Advanced LSB

2
Comments 3
5 min read
Me, Penetrating their defenses

Me, Penetrating their defenses

Comments
6 min read
Demystifying the magic of Zero Trust with my daughter and opensource

Demystifying the magic of Zero Trust with my daughter and opensource

Comments
4 min read
AWS Landing Zone setup through AWS Control Tower

AWS Landing Zone setup through AWS Control Tower

Comments
5 min read
SQL injection in Rails - Learn from an attacker’s shoes

SQL injection in Rails - Learn from an attacker’s shoes

4
Comments
6 min read
Create digital certificate

Create digital certificate

8
Comments
3 min read
How I unsuccessfully tried to recover my lost password

How I unsuccessfully tried to recover my lost password

7
Comments 2
12 min read
KubeClarity in Action - Image Scanning as part of your CI workflow

KubeClarity in Action - Image Scanning as part of your CI workflow

2
Comments
6 min read
Yes! OpenTelemetry is a Critical Part of Securing Your Systems

Yes! OpenTelemetry is a Critical Part of Securing Your Systems

3
Comments
7 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

Comments
3 min read
Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

1
Comments
5 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

3
Comments
3 min read
[GameDev] Unity3D, C# and String Security

[GameDev] Unity3D, C# and String Security

2
Comments 1
14 min read
Understanding AWS WAF Pricing

Understanding AWS WAF Pricing

6
Comments 2
6 min read
Increase AWS Security Posture with IAM Roles and Policies

Increase AWS Security Posture with IAM Roles and Policies

7
Comments 1
8 min read
Avoiding Common Mistakes in Cloud Architecture Design Interviews

Avoiding Common Mistakes in Cloud Architecture Design Interviews

6
Comments 2
3 min read
Reproducible Builds for Supply Chain Security

Reproducible Builds for Supply Chain Security

1
Comments
6 min read
Lenient scope search in Cerbos policies

Lenient scope search in Cerbos policies

3
Comments
3 min read
Use Tetragon to Limit Network Usage for a set of Binary

Use Tetragon to Limit Network Usage for a set of Binary

4
Comments 1
6 min read
Should You Roll Your Own RBAC Authorization?

Should You Roll Your Own RBAC Authorization?

6
Comments 3
6 min read
Returning customized content based on location with S3 Object Lambda

Returning customized content based on location with S3 Object Lambda

2
Comments
9 min read
Google Zanzibar vs OPA - Graph vs. Code Based Authorization

Google Zanzibar vs OPA - Graph vs. Code Based Authorization

Comments
5 min read
A Comprehensive Guide to Deep links and App Links in Android

A Comprehensive Guide to Deep links and App Links in Android

1
Comments
3 min read
Improve your app by using validations

Improve your app by using validations

Comments
1 min read
Mejora tu aplicación usando validaciones

Mejora tu aplicación usando validaciones

Comments
1 min read
Secure Your JavaScript Project with 'npm audit'!

Secure Your JavaScript Project with 'npm audit'!

4
Comments 1
2 min read
A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

Comments
8 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Secure GraphQL Microservices

Secure GraphQL Microservices

3
Comments
5 min read
Broken Access Control: What Is It and Why Does It Matter in your Rails application?

Broken Access Control: What Is It and Why Does It Matter in your Rails application?

4
Comments
8 min read
Tailscale vs ZeroTier

Tailscale vs ZeroTier

64
Comments 2
5 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

31
Comments 2
12 min read
How TLS / mTLS handshakes Work?

How TLS / mTLS handshakes Work?

5
Comments
2 min read
How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

8
Comments 2
3 min read
Efficient Data Management with Frozen Shards Decider in Elastic-search

Efficient Data Management with Frozen Shards Decider in Elastic-search

2
Comments 1
3 min read
Amazon CodeGuru Reviewer: already time for retirement?

Amazon CodeGuru Reviewer: already time for retirement?

Comments
7 min read
Migrating users without downtime in your service (The Lazy Migration Strategy)

Migrating users without downtime in your service (The Lazy Migration Strategy)

1
Comments
5 min read
Vulnerability Scanning

Vulnerability Scanning

1
Comments
2 min read
How SMS Fraud Works and How to Guard Against It

How SMS Fraud Works and How to Guard Against It

1
Comments
5 min read
Hack The Box Writeup: Emdee Five for Life

Hack The Box Writeup: Emdee Five for Life

Comments
6 min read
Play Microservices: Security

Play Microservices: Security

6
Comments
10 min read
awesome MLSecOps: aka prompt injection is the new SQL injection

awesome MLSecOps: aka prompt injection is the new SQL injection

3
Comments 2
2 min read
5 Strategies for Strengthening MQTT Infrastructure Security

5 Strategies for Strengthening MQTT Infrastructure Security

1
Comments
6 min read
Enhancing AWS Lambda Security with Deno

Enhancing AWS Lambda Security with Deno

1
Comments 3
4 min read
Understanding Authentication & Authorization in Istio

Understanding Authentication & Authorization in Istio

Comments
11 min read
loading...