DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding AWS IAM: Policies

Understanding AWS IAM: Policies

Comments
5 min read
Sessions & Cookies. Yum.

Sessions & Cookies. Yum.

3
Comments
3 min read
Preventing Illicit Uploads in MySQL – secure_file_priv

Preventing Illicit Uploads in MySQL – secure_file_priv

1
Comments
6 min read
AWS Config Service

AWS Config Service

2
Comments
2 min read
Building Secure Software: Ten Tips for Software Developers

Building Secure Software: Ten Tips for Software Developers

2
Comments
7 min read
How to Comply with GDPR in AWS

How to Comply with GDPR in AWS

Comments
2 min read
Role of Cryptography in Secure Digital Communication and Software Development.

Role of Cryptography in Secure Digital Communication and Software Development.

15
Comments
7 min read
5 Effective Ways to Prevent Directory Traversal

5 Effective Ways to Prevent Directory Traversal

2
Comments
5 min read
Laravel SMTP Crack: Unveiling the Vulnerability with Laravel SMTP Checker by XCATZE

Laravel SMTP Crack: Unveiling the Vulnerability with Laravel SMTP Checker by XCATZE

30
Comments 1
4 min read
AWS Security Hub

AWS Security Hub

1
Comments
2 min read
CORS in ASP.NET

CORS in ASP.NET

21
Comments 1
4 min read
How to Use Robots.txt to Improve Your Website's SEO

How to Use Robots.txt to Improve Your Website's SEO

8
Comments
3 min read
AWS ELB

AWS ELB

Comments
3 min read
AWS DynamoDB

AWS DynamoDB

Comments
2 min read
Bastion Host

Bastion Host

Comments
1 min read
AWS IAM - Policy

AWS IAM - Policy

Comments
5 min read
AWS KMS - Grants

AWS KMS - Grants

Comments
2 min read
AWS IAM

AWS IAM

Comments
5 min read
AWS Organizations

AWS Organizations

Comments
2 min read
AWS S3 - Bucket Policies

AWS S3 - Bucket Policies

Comments
3 min read
AWS Artifact

AWS Artifact

Comments
1 min read
AWS IAM - Policy - Troubleshooting

AWS IAM - Policy - Troubleshooting

Comments
2 min read
AWS KMS - Key Material

AWS KMS - Key Material

Comments
5 min read
AWS S3

AWS S3

Comments
9 min read
Understanding AWS IAM: Permissions

Understanding AWS IAM: Permissions

3
Comments
4 min read
How to Handle Secrets in Kubernetes

How to Handle Secrets in Kubernetes

7
Comments 1
8 min read
AWS Landing Zones

AWS Landing Zones

Comments
1 min read
Kubernetes: Storage & Security

Kubernetes: Storage & Security

1
Comments
11 min read
Security on AWS - AWS WAF x AWS App Runner

Security on AWS - AWS WAF x AWS App Runner

4
Comments 1
10 min read
🚀 Node.js 20: Unleashing the Power of Performance and Security 💪

🚀 Node.js 20: Unleashing the Power of Performance and Security 💪

1
Comments
2 min read
The Hidden Tradeoff of Keyless Auth

The Hidden Tradeoff of Keyless Auth

Comments
2 min read
Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

Utilizar el menor privilegio en AWS IAM + Webs para validar tus políticas

1
Comments
2 min read
RBAC with API Gateway and Open Policy Agent(OPA)

RBAC with API Gateway and Open Policy Agent(OPA)

39
Comments
10 min read
Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP)

1
Comments
6 min read
What Developers Need to Know About JWTs

What Developers Need to Know About JWTs

8
Comments
20 min read
Configure Nginx Reverse Proxy on Ubuntu VMs + SSL Encryption

Configure Nginx Reverse Proxy on Ubuntu VMs + SSL Encryption

4
Comments
3 min read
HTTP Security Headers in ASP.NET

HTTP Security Headers in ASP.NET

14
Comments 2
3 min read
How to Use Cross Account IAM Role

How to Use Cross Account IAM Role

23
Comments
2 min read
Check Windows Vulnerabilities Right Now with Vuls!

Check Windows Vulnerabilities Right Now with Vuls!

3
Comments 1
4 min read
🕵️ Active Directory Groups audit w. Neo4J

🕵️ Active Directory Groups audit w. Neo4J

1
Comments 1
2 min read
I Was Hacked: What I’ve Learned Since

I Was Hacked: What I’ve Learned Since

33
Comments 20
5 min read
Server Name Indication (SNI)

Server Name Indication (SNI)

15
Comments
7 min read
Applying Content Security Policy in Symfony to Reduce XSS Risks

Applying Content Security Policy in Symfony to Reduce XSS Risks

7
Comments
9 min read
Ensuring Secure User Sessions: A Guide to Logging Out Users Due to Inactivity in PHP

Ensuring Secure User Sessions: A Guide to Logging Out Users Due to Inactivity in PHP

3
Comments
2 min read
My CNCF LFX Mentorship Spring 2023 Project at Kubescape

My CNCF LFX Mentorship Spring 2023 Project at Kubescape

4
Comments
7 min read
Art of Manually Crafting Packets (TCP/IP).

Art of Manually Crafting Packets (TCP/IP).

11
Comments
6 min read
Why should you use IMDSv2 and not IMDS on AWS EC2

Why should you use IMDSv2 and not IMDS on AWS EC2

12
Comments
2 min read
Symfony internals and security

Symfony internals and security

3
Comments
3 min read
What is TCP/IP ? Introduction TCP/IP Packet.

What is TCP/IP ? Introduction TCP/IP Packet.

2
Comments
3 min read
Securing Node.js Applications with the Built-in Crypto Module: A Guide for Developers with code.

Securing Node.js Applications with the Built-in Crypto Module: A Guide for Developers with code.

5
Comments
3 min read
Types of Privilege Escalation Attacks

Types of Privilege Escalation Attacks

Comments
3 min read
Securing your Flutter apps with Multi-Factor Authentication

Securing your Flutter apps with Multi-Factor Authentication

10
Comments 1
14 min read
Understanding and Mitigating CRLF Injection

Understanding and Mitigating CRLF Injection

Comments
4 min read
Snowflake Roles and Access Control: What You Need to Know 101

Snowflake Roles and Access Control: What You Need to Know 101

5
Comments
18 min read
🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

🔨Build Enterprise Software with No-Code 💬Thanks to Bubble.io

41
Comments
4 min read
Understanding and Preventing NULL Pointer Dereference

Understanding and Preventing NULL Pointer Dereference

4
Comments
6 min read
An Introduction to OAuth 2.0 with Node.js and Passport.js

An Introduction to OAuth 2.0 with Node.js and Passport.js

5
Comments
3 min read
Secure Coding 101: How to Use Random Function

Secure Coding 101: How to Use Random Function

3
Comments
4 min read
Solving a critical bug in the default Rails caching library

Solving a critical bug in the default Rails caching library

10
Comments 2
6 min read
Multi-Factor Authentication in the Cloud

Multi-Factor Authentication in the Cloud

6
Comments 5
6 min read
loading...