DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Create Your Own Local Root CA With Yubikey Signing

Create Your Own Local Root CA With Yubikey Signing

15
Comments 2
16 min read
Publish Azure DevOps Extensions using Azure Workload Identity

Publish Azure DevOps Extensions using Azure Workload Identity

6
Comments
8 min read
Encrypting Sensitive Data in Rails 7 with Encrypted Attributes

Encrypting Sensitive Data in Rails 7 with Encrypted Attributes

7
Comments
4 min read
Secutils.dev technology stack overview

Secutils.dev technology stack overview

6
Comments
6 min read
How Your Secrets Management Maturity Can Impact Your DevOps Research and Assessment Metrics

How Your Secrets Management Maturity Can Impact Your DevOps Research and Assessment Metrics

Comments
5 min read
Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls

Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls

7
Comments 1
2 min read
New Relic Interactive Application Security Testing (IAST) - Data Sheet

New Relic Interactive Application Security Testing (IAST) - Data Sheet

2
Comments
1 min read
Docker Security: Clair

Docker Security: Clair

16
Comments
6 min read
Reset centOS root password

Reset centOS root password

3
Comments
1 min read
Why I Developed an AWS WAF Log Analysis Tool

Why I Developed an AWS WAF Log Analysis Tool

2
Comments 1
3 min read
🪄 Migrating from RBAC to ABAC with Permit.io 🐕🤯

🪄 Migrating from RBAC to ABAC with Permit.io 🐕🤯

7
Comments 1
5 min read
Find Source Code Vulnerabilities with CodeQL Before You Commit

Find Source Code Vulnerabilities with CodeQL Before You Commit

14
Comments
4 min read
Secutils.dev beta release is now public

Secutils.dev beta release is now public

7
Comments
2 min read
Tailscale vs WireGuard

Tailscale vs WireGuard

18
Comments 3
5 min read
IPv4 vs. IPv6: Bridging the Digital Divide

IPv4 vs. IPv6: Bridging the Digital Divide

18
Comments 1
3 min read
Decoding Access Control: Unveiling the Secrets of Secure Entry

Decoding Access Control: Unveiling the Secrets of Secure Entry

1
Comments
3 min read
Advancing Security through Access Control Systems

Advancing Security through Access Control Systems

1
Comments
4 min read
SecureCred

SecureCred

3
Comments 2
1 min read
How to Ensure RoR-based App Security Using Best Coding Practices

How to Ensure RoR-based App Security Using Best Coding Practices

2
Comments
6 min read
Vault Associate Certification (Part 0): Hello World

Vault Associate Certification (Part 0): Hello World

2
Comments
10 min read
Easy Encryption In Typescript

Easy Encryption In Typescript

22
Comments 6
5 min read
SAML vs OAuth: Choosing the right protocol for authentication

SAML vs OAuth: Choosing the right protocol for authentication

4
Comments
3 min read
Easy Encryption In Rust

Easy Encryption In Rust

2
Comments
3 min read
What's A Security Concept You Struggle With?

What's A Security Concept You Struggle With?

3
Comments
1 min read
Understanding MPC Wallets: Enhancing Security and Privacy in Cryptocurrency Management

Understanding MPC Wallets: Enhancing Security and Privacy in Cryptocurrency Management

1
Comments
12 min read
Steganography: Part 2 - Advanced LSB

Steganography: Part 2 - Advanced LSB

4
Comments 3
5 min read
Me, Penetrating their defenses

Me, Penetrating their defenses

Comments
6 min read
Demystifying the magic of Zero Trust with my daughter and opensource

Demystifying the magic of Zero Trust with my daughter and opensource

Comments
4 min read
AWS Landing Zone setup through AWS Control Tower

AWS Landing Zone setup through AWS Control Tower

Comments
5 min read
SQL injection in Rails - Learn from an attacker’s shoes

SQL injection in Rails - Learn from an attacker’s shoes

4
Comments
6 min read
Create digital certificate

Create digital certificate

8
Comments
3 min read
How I unsuccessfully tried to recover my lost password

How I unsuccessfully tried to recover my lost password

7
Comments 2
12 min read
KubeClarity in Action - Image Scanning as part of your CI workflow

KubeClarity in Action - Image Scanning as part of your CI workflow

2
Comments
6 min read
Yes! OpenTelemetry is a Critical Part of Securing Your Systems

Yes! OpenTelemetry is a Critical Part of Securing Your Systems

3
Comments
7 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

Comments
3 min read
Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

Scaling Ory Hydra to ~2bn monthly OAuth2 flows on a single PostgreSQL DB

1
Comments
5 min read
Understanding OAuth 2.0 with the help of AI

Understanding OAuth 2.0 with the help of AI

3
Comments
3 min read
[GameDev] Unity3D, C# and String Security

[GameDev] Unity3D, C# and String Security

2
Comments 1
14 min read
Understanding AWS WAF Pricing

Understanding AWS WAF Pricing

6
Comments 2
6 min read
Increase AWS Security Posture with IAM Roles and Policies

Increase AWS Security Posture with IAM Roles and Policies

7
Comments 1
8 min read
Avoiding Common Mistakes in Cloud Architecture Design Interviews

Avoiding Common Mistakes in Cloud Architecture Design Interviews

6
Comments 2
3 min read
Reproducible Builds for Supply Chain Security

Reproducible Builds for Supply Chain Security

1
Comments
6 min read
Lenient scope search in Cerbos policies

Lenient scope search in Cerbos policies

3
Comments
3 min read
Use Tetragon to Limit Network Usage for a set of Binary

Use Tetragon to Limit Network Usage for a set of Binary

4
Comments 1
6 min read
Should You Roll Your Own RBAC Authorization?

Should You Roll Your Own RBAC Authorization?

6
Comments 3
6 min read
Returning customized content based on location with S3 Object Lambda

Returning customized content based on location with S3 Object Lambda

2
Comments
9 min read
Google Zanzibar vs OPA - Graph vs. Code Based Authorization

Google Zanzibar vs OPA - Graph vs. Code Based Authorization

Comments
5 min read
A Comprehensive Guide to Deep links and App Links in Android

A Comprehensive Guide to Deep links and App Links in Android

1
Comments
3 min read
Improve your app by using validations

Improve your app by using validations

Comments
1 min read
Mejora tu aplicación usando validaciones

Mejora tu aplicación usando validaciones

Comments
1 min read
Secure Your JavaScript Project with 'npm audit'!

Secure Your JavaScript Project with 'npm audit'!

4
Comments 1
2 min read
A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

A Developer’s Guide to Secure Coding with FORTIFY_SOURCE

Comments
8 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Secure GraphQL Microservices

Secure GraphQL Microservices

3
Comments
5 min read
Broken Access Control: What Is It and Why Does It Matter in your Rails application?

Broken Access Control: What Is It and Why Does It Matter in your Rails application?

3
Comments
8 min read
Tailscale vs ZeroTier

Tailscale vs ZeroTier

70
Comments 2
5 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

31
Comments 2
12 min read
How TLS / mTLS handshakes Work?

How TLS / mTLS handshakes Work?

6
Comments
2 min read
How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

How to Create a Login for your WebApp with AWS Cognito Using OAuth 2.0

8
Comments 2
3 min read
Efficient Data Management with Frozen Shards Decider in Elastic-search

Efficient Data Management with Frozen Shards Decider in Elastic-search

2
Comments 1
3 min read
loading...