DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Updating Security Groups in AWS ECS on Fargate

Updating Security Groups in AWS ECS on Fargate

2
Comments
2 min read
Overview of Pentesting Phases

Overview of Pentesting Phases

5
Comments
2 min read
Information Gathering

Information Gathering

5
Comments
2 min read
Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

2
Comments
4 min read
Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Comments
3 min read
Unveiling the Power of AI in Software Security at DevSecCon

Unveiling the Power of AI in Software Security at DevSecCon

2
Comments 1
3 min read
Serve your hash with Salt and Pepper for Stronger Account Security

Serve your hash with Salt and Pepper for Stronger Account Security

2
Comments
6 min read
Simplify Password Management with the 'pass' Command-Line Password Manager

Simplify Password Management with the 'pass' Command-Line Password Manager

10
Comments 2
2 min read
Securely Storing API Keys in Flutter

Securely Storing API Keys in Flutter

12
Comments 2
2 min read
A Comprehensive Guide to Cookies and Sessions in Web Development with Python

A Comprehensive Guide to Cookies and Sessions in Web Development with Python

5
Comments
4 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
Phishing Attacks Explained: Protecting Yourself from Online Scams

Phishing Attacks Explained: Protecting Yourself from Online Scams

1
Comments
3 min read
Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

4
Comments
3 min read
Remotely Connect to Your Instances without a Public IP Address

Remotely Connect to Your Instances without a Public IP Address

3
Comments 4
3 min read
Gerenciando SD Elements com o Jira

Gerenciando SD Elements com o Jira

2
Comments
1 min read
Understanding Security Vulnerabilities: A First Step in Preventing Attacks

Understanding Security Vulnerabilities: A First Step in Preventing Attacks

10
Comments
8 min read
How to Detect and Fix Kubernetes Misconfigurations

How to Detect and Fix Kubernetes Misconfigurations

3
Comments
5 min read
Flex your muscles 🧠💪

Flex your muscles 🧠💪

1
Comments
2 min read
Hello spiderfoot

Hello spiderfoot

Comments
1 min read
Will passkeys kill password managers?

Will passkeys kill password managers?

3
Comments 2
2 min read
Understanding Authorization Before Authentication: Enhancing Web API Security

Understanding Authorization Before Authentication: Enhancing Web API Security

35
Comments
4 min read
Amazon Verified Permissions

Amazon Verified Permissions

Comments
2 min read
How does JWT work?

How does JWT work?

6
Comments
1 min read
SSL para SaaS com multiplos domínios usando Docker e Caddy

SSL para SaaS com multiplos domínios usando Docker e Caddy

3
Comments
2 min read
Revolutionize authentication through the 1Password Hackathon

Revolutionize authentication through the 1Password Hackathon

9
Comments
4 min read
Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Comments
5 min read
Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Comments
3 min read
Software Security with Laurie Williams

Software Security with Laurie Williams

2
Comments
2 min read
Jump-Box EC2 101: Unlocking Secure Access to Private Resources

Jump-Box EC2 101: Unlocking Secure Access to Private Resources

4
Comments
4 min read
The Reddit blackout is a lesson in risk management

The Reddit blackout is a lesson in risk management

22
Comments 28
3 min read
Single Sign On protocols: SAML vs OpenID Connect

Single Sign On protocols: SAML vs OpenID Connect

3
Comments 1
4 min read
Easter Eggs!

Easter Eggs!

1
Comments 1
3 min read
AWS and Cyber Insurance

AWS and Cyber Insurance

2
Comments
2 min read
Regular Expression Denial of Service (ReDoS)

Regular Expression Denial of Service (ReDoS)

1
Comments 1
1 min read
How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
Debugging SQS subscription issues to topics

Debugging SQS subscription issues to topics

2
Comments
4 min read
AWS IAM CLI: a cheatsheet

AWS IAM CLI: a cheatsheet

13
Comments
9 min read
Como utilizar a ferramenta de UM

Como utilizar a ferramenta de UM

1
Comments
2 min read
Veracode Upload & Scan Deep Dive

Veracode Upload & Scan Deep Dive

1
Comments
5 min read
[Solidity] Reentrancy vulnerability

[Solidity] Reentrancy vulnerability

1
Comments
2 min read
Build Safer Docker Images

Build Safer Docker Images

4
Comments 3
2 min read
XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

XSS vulnerability in the ASP.NET application: CVE-2023-24322 in mojoPortal CMS

Comments
9 min read
Shared Security Architecture for Cloud

Shared Security Architecture for Cloud

1
Comments
6 min read
Mastering AWS IAM: Best Practices for Secure Access Management

Mastering AWS IAM: Best Practices for Secure Access Management

Comments
3 min read
SCA Agent-Based Deep Dive

SCA Agent-Based Deep Dive

4
Comments
4 min read
Como proteger aplicações React contra ataques de cross-site scripting (XSS)

Como proteger aplicações React contra ataques de cross-site scripting (XSS)

1
Comments
3 min read
Let's discuss a Password Manager for the Apocalypse Era.

Let's discuss a Password Manager for the Apocalypse Era.

2
Comments 1
1 min read
Unlocking the Potential of FORTIFY_SOURCE

Unlocking the Potential of FORTIFY_SOURCE

Comments
4 min read
How to restrict a user to use single region in AWS

How to restrict a user to use single region in AWS

Comments
1 min read
How to enforce MFA in AWS - Part I - Create User, Role & Policy

How to enforce MFA in AWS - Part I - Create User, Role & Policy

Comments
2 min read
How to enforce MFA in AWS - Part II - Using `aws` CLI and terraform with MFA

How to enforce MFA in AWS - Part II - Using `aws` CLI and terraform with MFA

2
Comments
2 min read
Analyzing the HamsterWheel: An Advanced State Management Vulnerability in Sui's Blockchain Architecture

Analyzing the HamsterWheel: An Advanced State Management Vulnerability in Sui's Blockchain Architecture

Comments
12 min read
Orchestrate your Organization around Best Practices, Security, Audit & Account Management using AWS Control Tower

Orchestrate your Organization around Best Practices, Security, Audit & Account Management using AWS Control Tower

1
Comments
3 min read
Auth, Auth, Auth?

Auth, Auth, Auth?

5
Comments
5 min read
Atrelar máquina Linux ao Active Directory

Atrelar máquina Linux ao Active Directory

7
Comments
3 min read
Secure Coding Best Practices

Secure Coding Best Practices

1
Comments
8 min read
How AppMap's runtime analysis finds performance and security flaws

How AppMap's runtime analysis finds performance and security flaws

7
Comments
6 min read
What's in a Name? Decoding the Language of Today's Cloud-Native Security Solutions

What's in a Name? Decoding the Language of Today's Cloud-Native Security Solutions

1
Comments
6 min read
Secure by Design: Enhancing React.js Application Security

Secure by Design: Enhancing React.js Application Security

2
Comments
9 min read
Docker Scoutによる脆弱性・依存性のスキャニング

Docker Scoutによる脆弱性・依存性のスキャニング

Comments
20 min read
loading...