DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Rational Shift-Left Security for Developers

Rational Shift-Left Security for Developers

2
Comments 1
7 min read
TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

TIL: Best Practices for Handling Secret Keys in Sinatra - The Do's and Don'ts

4
Comments 1
4 min read
Programmatically retrieving secrets from Parameter Store and Secrets Manager

Programmatically retrieving secrets from Parameter Store and Secrets Manager

10
Comments
6 min read
True Secrets Auto Rotation with ESO and Vault

True Secrets Auto Rotation with ESO and Vault

14
Comments
7 min read
The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

The Future of Passkeys: A Deep Dive into Dashlane's Innovative Approach

3
Comments
2 min read
Flexible Policy Composition - Local & Export Variables in Cerbos Policies

Flexible Policy Composition - Local & Export Variables in Cerbos Policies

1
Comments
3 min read
Setting up SSL Certificate with Nginx

Setting up SSL Certificate with Nginx

6
Comments
2 min read
Advanced Secure Node.js Auth with JWT

Advanced Secure Node.js Auth with JWT

26
Comments 1
5 min read
Introduction: Safeguarding Your Spaces in an Interconnected World

Introduction: Safeguarding Your Spaces in an Interconnected World

1
Comments 1
3 min read
Top 5 Featured DEV Tag(#security) Posts from the Past Week

Top 5 Featured DEV Tag(#security) Posts from the Past Week

1
Comments 3
1 min read
JWT desmistificado

JWT desmistificado

3
Comments 1
3 min read
Going Blind to Find the Way (INTIGRITI Challenge 0723)

Going Blind to Find the Way (INTIGRITI Challenge 0723)

4
Comments 1
6 min read
Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

Securely Managing, Distributing, and Scaling Secrets Across Multiple Kubernetes Clusters

2
Comments
3 min read
Overview of AWS Security Group

Overview of AWS Security Group

13
Comments
3 min read
Guide to pentesting (what, why, and how)

Guide to pentesting (what, why, and how)

1
Comments
3 min read
Top 10 Best Web Application Security Best Practices for Developers to Follow

Top 10 Best Web Application Security Best Practices for Developers to Follow

7
Comments
6 min read
Security Advisory for Tauri 1.4 (CVE-2023-34460)

Security Advisory for Tauri 1.4 (CVE-2023-34460)

6
Comments
3 min read
Configure SSH Keys for Your GitHub Account

Configure SSH Keys for Your GitHub Account

2
Comments
3 min read
BoxyHQ + Cerbos: Merging SSO and Authorization

BoxyHQ + Cerbos: Merging SSO and Authorization

1
Comments
10 min read
Cracking Firefox Encryption and Rescuing Saved Passwords!

Cracking Firefox Encryption and Rescuing Saved Passwords!

17
Comments 1
3 min read
Django - reCaptcha

Django - reCaptcha

11
Comments
4 min read
The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

The Importance of Server-Side Handling: Safeguarding Sensitive Information in Web Applications

Comments
2 min read
Understanding Container Security

Understanding Container Security

6
Comments
5 min read
Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Demystifying DDoS Attacks and CloudFront: A DevSecOps Guide

Comments
3 min read
Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

Everything You Need to Know About the Difference Between OPA's Rego and AWS Cedar

11
Comments 2
5 min read
Security🔐 Concerns with Cookies🍪.

Security🔐 Concerns with Cookies🍪.

24
Comments 8
4 min read
Build your own Remote Access VPN to AWS with WireGuard and Netmaker

Build your own Remote Access VPN to AWS with WireGuard and Netmaker

42
Comments 2
4 min read
How to use JWT authentication with Iris

How to use JWT authentication with Iris

Comments
8 min read
RLS of Supabase(PostgreSQL) Is Good, But …🤔

RLS of Supabase(PostgreSQL) Is Good, But …🤔

54
Comments 4
6 min read
Securely downloading encrypted S3 objects using CloudFront

Securely downloading encrypted S3 objects using CloudFront

5
Comments
5 min read
Best Practices for Audit Logs in Cloud Applications

Best Practices for Audit Logs in Cloud Applications

8
Comments 1
8 min read
Unlocking the Secrets of GDPR Compliance in IT Outsourcing

Unlocking the Secrets of GDPR Compliance in IT Outsourcing

15
Comments
10 min read
Deploying Code Safely: Protecting Sensitive Data in Your Projects

Deploying Code Safely: Protecting Sensitive Data in Your Projects

3
Comments
1 min read
Verifiable Random Functions (VRF) with Ruby

Verifiable Random Functions (VRF) with Ruby

11
Comments
5 min read
Server-Side Request Forgery in Rails

Server-Side Request Forgery in Rails

Comments
5 min read
Drawbacks of IP whitelist

Drawbacks of IP whitelist

7
Comments 1
2 min read
Netmaker - WireGuard Made Easy

Netmaker - WireGuard Made Easy

47
Comments 1
2 min read
The evolution of password hashing

The evolution of password hashing

5
Comments
8 min read
Workload Identity GKE - Service account k8s com permissões na GCP

Workload Identity GKE - Service account k8s com permissões na GCP

Comments
3 min read
It depends! Exploring my favourite Renovate features for dependency updates

It depends! Exploring my favourite Renovate features for dependency updates

1
Comments
6 min read
How to Hide Your Network in the AWS Cloud Using NAT Gateway

How to Hide Your Network in the AWS Cloud Using NAT Gateway

16
Comments
3 min read
Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

Ethereum's Consensus Puzzle: Solving the Trust Equation in a Blockchain Revolution

21
Comments 2
8 min read
Como evitar ataques de injeção de código em aplicações Node.js

Como evitar ataques de injeção de código em aplicações Node.js

Comments
4 min read
A Technical Deep Dive into Veeam Backup for AWS

A Technical Deep Dive into Veeam Backup for AWS

2
Comments
4 min read
The Ethereum Virtual Machine: Fueling the Decentralized Revolution

The Ethereum Virtual Machine: Fueling the Decentralized Revolution

24
Comments 2
13 min read
What is HTTPS and how does it work?

What is HTTPS and how does it work?

36
Comments 8
5 min read
Building Trust in a Trustless World: Decentralized Applications Unveiled

Building Trust in a Trustless World: Decentralized Applications Unveiled

20
Comments 2
10 min read
What's the Best Practice for Auth and Why

What's the Best Practice for Auth and Why

63
Comments 3
4 min read
O arco-íris da cybersegurança

O arco-íris da cybersegurança

186
Comments 12
4 min read
What is the easiest way to do auth?

What is the easiest way to do auth?

1
Comments 6
1 min read
How to Secure Your Router: A Comprehensive Guide to Fortify Your Home Network

How to Secure Your Router: A Comprehensive Guide to Fortify Your Home Network

Comments
5 min read
Authentication for Spring Boot App with Authgear and OAuth2

Authentication for Spring Boot App with Authgear and OAuth2

10
Comments 2
7 min read
AWS Blueprint for Ransomware Defense - Resumen

AWS Blueprint for Ransomware Defense - Resumen

Comments
11 min read
How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

How to upload Large, Multiple, and Sensitive files on Jotform using Uploadcare Integration

Comments
6 min read
How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

How to migrate from an old OpenWrt router to a new one, with the least downtime for your home network

1
Comments
4 min read
Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

Azure Pipeline: Executing SQL Script via Service Principal with Minimal Permissions

1
Comments
9 min read
Understanding JWTs: A Simple Guide for Beginners

Understanding JWTs: A Simple Guide for Beginners

103
Comments 9
2 min read
How to Secure A Linux VPS?

How to Secure A Linux VPS?

7
Comments
4 min read
Id or UUID: Which one should you use as the primary key in your DB?

Id or UUID: Which one should you use as the primary key in your DB?

1
Comments
3 min read
RBAC for Exchange Online Mailboxes

RBAC for Exchange Online Mailboxes

6
Comments
4 min read
loading...