DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What is a IAM Principal?

What is a IAM Principal?

9
Comments 1
6 min read
Build Custom Authentication Using Appsmith and APISIX

Build Custom Authentication Using Appsmith and APISIX

50
Comments
9 min read
Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

Integrating Keycloak as my Identity Provider for IAM Identity Centre: Part one, deploying Keycloak on AWS

13
Comments 1
15 min read
Best Practices for Staying Safe on Public Wi-Fi Networks

Best Practices for Staying Safe on Public Wi-Fi Networks

3
Comments
4 min read
AWS IAM: Allowing a Role to Assume Another Role

AWS IAM: Allowing a Role to Assume Another Role

Comments
2 min read
Spring security in a nutshell

Spring security in a nutshell

1
Comments
5 min read
Understanding Role-Based Access Control with ASP.NET Web APIs

Understanding Role-Based Access Control with ASP.NET Web APIs

25
Comments
3 min read
The curious case of AWS IAM's policies

The curious case of AWS IAM's policies

Comments
4 min read
Security headers - what they are and how to use them 🔒

Security headers - what they are and how to use them 🔒

2
Comments
3 min read
DevOps vs DevSecOps: The Debate

DevOps vs DevSecOps: The Debate

4
Comments
10 min read
Credentials Leak with Knex

Credentials Leak with Knex

2
Comments
7 min read
Cross-Origin-Resource-Sharing (CORS): Explanation and how to handle it?

Cross-Origin-Resource-Sharing (CORS): Explanation and how to handle it?

Comments
10 min read
Service Account 101: the Power of M2M with Security in Mind

Service Account 101: the Power of M2M with Security in Mind

Comments
9 min read
Understanding Eventual Consistency

Understanding Eventual Consistency

4
Comments
3 min read
Ethernaut - Lvl 7: Force

Ethernaut - Lvl 7: Force

Comments
2 min read
Dynamic Permissions in React using CASL: A Guide to Secure Your App🔒

Dynamic Permissions in React using CASL: A Guide to Secure Your App🔒

24
Comments
3 min read
4 Security Risks That Make Your Unsecured Lambda Functions Vulnerable

4 Security Risks That Make Your Unsecured Lambda Functions Vulnerable

5
Comments 2
5 min read
Ethernaut - Lvl 6: Delegation

Ethernaut - Lvl 6: Delegation

Comments
4 min read
Malware - Free Followers

Malware - Free Followers

7
Comments 1
3 min read
Securing Your Next.js Application with Strict CSP

Securing Your Next.js Application with Strict CSP

23
Comments 4
3 min read
Securing Your Data Lake with Apache Atlas: The Ultimate Guide

Securing Your Data Lake with Apache Atlas: The Ultimate Guide

11
Comments
13 min read
What the heck is SSH?

What the heck is SSH?

5
Comments
6 min read
Thoughts on How to Prevent NoSQL Injection for Node.js Express Server

Thoughts on How to Prevent NoSQL Injection for Node.js Express Server

2
Comments
4 min read
Using HTTP Strict Transport Security (HSTS) headers in Node.js server

Using HTTP Strict Transport Security (HSTS) headers in Node.js server

4
Comments
3 min read
What is Provisioning and how does it work?

What is Provisioning and how does it work?

3
Comments
2 min read
How should we keep our logs?

How should we keep our logs?

Comments
6 min read
How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty

How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty

11
Comments
4 min read
Hackers Tools: Must-Have Tools for Every Ethical Hacker

Hackers Tools: Must-Have Tools for Every Ethical Hacker

62
Comments 6
6 min read
JWT Authentication in ASP.NET

JWT Authentication in ASP.NET

16
Comments
11 min read
[HUGO]: How to use variables from .env

[HUGO]: How to use variables from .env

2
Comments
1 min read
3 Reasons Why Security is Key When Writing AWS Lambda Functions

3 Reasons Why Security is Key When Writing AWS Lambda Functions

3
Comments
2 min read
Boas Práticas em Criptografia de Dados 🔐

Boas Práticas em Criptografia de Dados 🔐

1
Comments
6 min read
Vault for Beginners

Vault for Beginners

5
Comments
4 min read
Join the 1Password Hackathon hosted by Hashnode and compete for $10,000 in prizes

Join the 1Password Hackathon hosted by Hashnode and compete for $10,000 in prizes

9
Comments
4 min read
Passwords Are Bad UX

Passwords Are Bad UX

3
Comments 1
2 min read
Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

Encryption, Hashing, Salting: What does it mean for your Users Password's safety?

2
Comments
5 min read
Code Smell 215 - Deserializing Object Vulnerability

Code Smell 215 - Deserializing Object Vulnerability

1
Comments
2 min read
Securing Your Home Network: 9 Very Simple Steps To Help Prevent Unauthorized Access

Securing Your Home Network: 9 Very Simple Steps To Help Prevent Unauthorized Access

3
Comments
3 min read
Compose and Send a Secure Message in Minutes with DataMotion APIs

Compose and Send a Secure Message in Minutes with DataMotion APIs

1
Comments
3 min read
Ethernaut - Lvl 4: Telephone

Ethernaut - Lvl 4: Telephone

Comments
3 min read
4 Essential Security Tools To Level Up Your Rails Security

4 Essential Security Tools To Level Up Your Rails Security

4
Comments
8 min read
Using IoT to Combat Drug Trafficking: Technology and Efficient Strategies

Using IoT to Combat Drug Trafficking: Technology and Efficient Strategies

Comments
7 min read
Best ways to fix Nodemon error- nodemon.ps1 cannot be loaded because running scripts is disabled on this system.

Best ways to fix Nodemon error- nodemon.ps1 cannot be loaded because running scripts is disabled on this system.

11
Comments
3 min read
Send SMS Directly from the Browser (No Backend Code Required!)

Send SMS Directly from the Browser (No Backend Code Required!)

Comments
10 min read
Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

Demystifying PGP Keys: Understanding the Inner Workings of Public-Key Cryptography

6
Comments
3 min read
How to set up an SSH Bastion server in one minute

How to set up an SSH Bastion server in one minute

6
Comments
7 min read
SwiftUI: a property wrapper to secure settings

SwiftUI: a property wrapper to secure settings

2
Comments
3 min read
Never Use Credentials In A CI/CD Pipeline Again

Never Use Credentials In A CI/CD Pipeline Again

1
Comments
8 min read
Ethernaut - Lvl 3: Coin Flip

Ethernaut - Lvl 3: Coin Flip

Comments
4 min read
🔒💡 Building a Password Generator Web Application with Flask: Secure Your Data! 🔐🚀

🔒💡 Building a Password Generator Web Application with Flask: Secure Your Data! 🔐🚀

3
Comments
3 min read
Enterprise-scaled Self-Healing StackSets

Enterprise-scaled Self-Healing StackSets

6
Comments 3
7 min read
Ethernaut - Lvl 2: Fallout

Ethernaut - Lvl 2: Fallout

Comments
3 min read
Securing S3 Buckets: Flaws.cloud level1

Securing S3 Buckets: Flaws.cloud level1

1
Comments
6 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

13
Comments
9 min read
Secure Your Applications with Firejail: A Linux Sandbox Tutorial

Secure Your Applications with Firejail: A Linux Sandbox Tutorial

6
Comments 1
3 min read
Ethernaut - Lvl 1: Fallback

Ethernaut - Lvl 1: Fallback

Comments
4 min read
Find out how to use Google to locate your home using just your Wi-Fi router!

Find out how to use Google to locate your home using just your Wi-Fi router!

19
Comments
4 min read
Descubra como usar o Google para localizar sua casa utilizando apenas o seu roteador Wi-Fi!

Descubra como usar o Google para localizar sua casa utilizando apenas o seu roteador Wi-Fi!

4
Comments
4 min read
Ethernaut - Lvl 0: Hello Ethernaut

Ethernaut - Lvl 0: Hello Ethernaut

1
Comments
4 min read
Supercharged Dependency Management With A Dependency Firewall

Supercharged Dependency Management With A Dependency Firewall

1
Comments
2 min read
loading...