DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Linux Permissions Unraveled: How to Avoid ‘chmod 777’ and Keep the Chaos at Bay!

Linux Permissions Unraveled: How to Avoid ‘chmod 777’ and Keep the Chaos at Bay!

1
Comments
5 min read
Passwordless Authentication: The Key to Preventing Credential Stuffing

Passwordless Authentication: The Key to Preventing Credential Stuffing

Comments
4 min read
Generating SSH key – the best way

Generating SSH key – the best way

Comments
2 min read
Secrets and Environment Variables in your GitHub Action

Secrets and Environment Variables in your GitHub Action

23
Comments 1
3 min read
10 steps to secure your Laravel Application

10 steps to secure your Laravel Application

2
Comments 1
2 min read
The essential security checklist for user identity

The essential security checklist for user identity

5
Comments
6 min read
Building Secure Docker Images for Production - Best Practices

Building Secure Docker Images for Production - Best Practices

25
Comments 4
7 min read
php[tek] 2023 - A Community Of Communities Powering The Internet

php[tek] 2023 - A Community Of Communities Powering The Internet

2
Comments
9 min read
GitHub Pages: Custom Domains and SSL

GitHub Pages: Custom Domains and SSL

2
Comments
4 min read
ChatGPT at Work: How to block Content Leaks 🔒

ChatGPT at Work: How to block Content Leaks 🔒

3
Comments
2 min read
Docker Secrets Best Practices: Protecting Sensitive Information in Containers

Docker Secrets Best Practices: Protecting Sensitive Information in Containers

13
Comments 2
6 min read
Updating Security Groups in AWS ECS on Fargate

Updating Security Groups in AWS ECS on Fargate

2
Comments
2 min read
Overview of Pentesting Phases

Overview of Pentesting Phases

5
Comments
2 min read
Information Gathering

Information Gathering

5
Comments
2 min read
Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

2
Comments
4 min read
Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Comments
3 min read
Unveiling the Power of AI in Software Security at DevSecCon

Unveiling the Power of AI in Software Security at DevSecCon

2
Comments 1
3 min read
Serve your hash with Salt and Pepper for Stronger Account Security

Serve your hash with Salt and Pepper for Stronger Account Security

2
Comments
6 min read
Simplify Password Management with the 'pass' Command-Line Password Manager

Simplify Password Management with the 'pass' Command-Line Password Manager

10
Comments 2
2 min read
Securely Storing API Keys in Flutter

Securely Storing API Keys in Flutter

12
Comments 2
2 min read
A Comprehensive Guide to Cookies and Sessions in Web Development with Python

A Comprehensive Guide to Cookies and Sessions in Web Development with Python

4
Comments
4 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
Phishing Attacks Explained: Protecting Yourself from Online Scams

Phishing Attacks Explained: Protecting Yourself from Online Scams

1
Comments
3 min read
Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

4
Comments
3 min read
Remotely Connect to Your Instances without a Public IP Address

Remotely Connect to Your Instances without a Public IP Address

3
Comments 4
3 min read
Gerenciando SD Elements com o Jira

Gerenciando SD Elements com o Jira

2
Comments
1 min read
Understanding Security Vulnerabilities: A First Step in Preventing Attacks

Understanding Security Vulnerabilities: A First Step in Preventing Attacks

10
Comments
8 min read
How to Detect and Fix Kubernetes Misconfigurations

How to Detect and Fix Kubernetes Misconfigurations

3
Comments
5 min read
Flex your muscles 🧠💪

Flex your muscles 🧠💪

1
Comments
2 min read
Hello spiderfoot

Hello spiderfoot

Comments
1 min read
Will passkeys kill password managers?

Will passkeys kill password managers?

3
Comments 2
2 min read
Understanding Authorization Before Authentication: Enhancing Web API Security

Understanding Authorization Before Authentication: Enhancing Web API Security

34
Comments
4 min read
Amazon Verified Permissions

Amazon Verified Permissions

Comments
2 min read
How does JWT work?

How does JWT work?

6
Comments
1 min read
SSL para SaaS com multiplos domínios usando Docker e Caddy

SSL para SaaS com multiplos domínios usando Docker e Caddy

3
Comments
2 min read
Revolutionize authentication through the 1Password Hackathon

Revolutionize authentication through the 1Password Hackathon

9
Comments
4 min read
Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Comments
5 min read
Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Comments
3 min read
Software Security with Laurie Williams

Software Security with Laurie Williams

2
Comments
2 min read
Jump-Box EC2 101: Unlocking Secure Access to Private Resources

Jump-Box EC2 101: Unlocking Secure Access to Private Resources

4
Comments
4 min read
The Reddit blackout is a lesson in risk management

The Reddit blackout is a lesson in risk management

22
Comments 28
3 min read
Single Sign On protocols: SAML vs OpenID Connect

Single Sign On protocols: SAML vs OpenID Connect

3
Comments 1
4 min read
Easter Eggs!

Easter Eggs!

1
Comments 1
3 min read
AWS and Cyber Insurance

AWS and Cyber Insurance

2
Comments
2 min read
Regular Expression Denial of Service (ReDoS)

Regular Expression Denial of Service (ReDoS)

1
Comments 1
1 min read
How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
Debugging SQS subscription issues to topics

Debugging SQS subscription issues to topics

2
Comments
4 min read
AWS IAM CLI: a cheatsheet

AWS IAM CLI: a cheatsheet

13
Comments
9 min read
Como utilizar a ferramenta de UM

Como utilizar a ferramenta de UM

1
Comments
2 min read
Veracode Upload & Scan Deep Dive

Veracode Upload & Scan Deep Dive

1
Comments
5 min read
[Solidity] Reentrancy vulnerability

[Solidity] Reentrancy vulnerability

1
Comments
2 min read
Build Safer Docker Images

Build Safer Docker Images

4
Comments 3
2 min read
XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

Comments
9 min read
Shared Security Architecture for Cloud

Shared Security Architecture for Cloud

1
Comments
6 min read
Mastering AWS IAM: Best Practices for Secure Access Management

Mastering AWS IAM: Best Practices for Secure Access Management

Comments
3 min read
SCA Agent-Based Deep Dive

SCA Agent-Based Deep Dive

4
Comments
4 min read
Como proteger aplicações React contra ataques de cross-site scripting (XSS)

Como proteger aplicações React contra ataques de cross-site scripting (XSS)

1
Comments
3 min read
Let's discuss a Password Manager for the Apocalypse Era.

Let's discuss a Password Manager for the Apocalypse Era.

2
Comments 1
1 min read
Unlocking the Potential of FORTIFY_SOURCE

Unlocking the Potential of FORTIFY_SOURCE

Comments
4 min read
How to restrict a user to use single region in AWS

How to restrict a user to use single region in AWS

Comments
1 min read
loading...