DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

Ensuring secure values by private keys in AWS (KMS, SSM, Secrets Manager)

7
Comments
6 min read
Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

Zero Trust Approach to Cloud Data Security through Software-Defined Perimeter (SDP)

2
Comments
4 min read
Are your PDFs Actually Redacted? Double Check!

Are your PDFs Actually Redacted? Double Check!

1
Comments
3 min read
API SECURITY, how to protect your API against vulnerability risks

API SECURITY, how to protect your API against vulnerability risks

2
Comments
4 min read
Best Security Practices for Docker in 2023

Best Security Practices for Docker in 2023

22
Comments 4
8 min read
Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Locked Out of Your RHEL 9 System? Here's How to Reset Your Root Password and Regain Access in Minutes

Comments
7 min read
Depend(abot) on Umbraco patching

Depend(abot) on Umbraco patching

1
Comments
3 min read
DelegateCall in Solidity — With Some Code Examples

DelegateCall in Solidity — With Some Code Examples

Comments
5 min read
Use Amazon CodeWhisperer for Your AWS Security

Use Amazon CodeWhisperer for Your AWS Security

6
Comments 6
4 min read
Multi-tenancy authentication done right

Multi-tenancy authentication done right

3
Comments
8 min read
What Does 2FA Actually Mean?

What Does 2FA Actually Mean?

3
Comments
3 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

Password Cracking: What is a Rainbow Table Attack and how do I prevent it?

11
Comments
4 min read
COMMON API VULNERABILITIES

COMMON API VULNERABILITIES

Comments
6 min read
When checking your Python package sources matters

When checking your Python package sources matters

2
Comments
4 min read
API Rate Limiting Cheat Sheet

API Rate Limiting Cheat Sheet

11
Comments 3
5 min read
Step-up authentication in Keycloak + Spring Boot

Step-up authentication in Keycloak + Spring Boot

19
Comments 1
8 min read
Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Comments
10 min read
Rethinking Security: The Need for Cookie Support in Native Mobile Applications

Rethinking Security: The Need for Cookie Support in Native Mobile Applications

2
Comments 2
3 min read
đź”’Security Tips for Frontend

đź”’Security Tips for Frontend

9
Comments
4 min read
Basic Kotlin/Java + Spring app with GitHub OAuth 2.0

Basic Kotlin/Java + Spring app with GitHub OAuth 2.0

4
Comments
5 min read
How to Secure the Web: A Comprehensive Guide to Authentication Strategies for Developers

How to Secure the Web: A Comprehensive Guide to Authentication Strategies for Developers

33
Comments 13
8 min read
How to get information about the provenance of Python packages installed

How to get information about the provenance of Python packages installed

3
Comments
6 min read
ReVen: a Reverse Engineering Toolkit AIO

ReVen: a Reverse Engineering Toolkit AIO

3
Comments
5 min read
Domain-Driven Architecture Used in Software Development

Domain-Driven Architecture Used in Software Development

1
Comments
5 min read
AWS CDK template validation during synthesis with Cloudformation Guard

AWS CDK template validation during synthesis with Cloudformation Guard

Comments
2 min read
Why Docker Scout

Why Docker Scout

1
Comments
4 min read
How Authentication and Authorization Work for SPAs

How Authentication and Authorization Work for SPAs

7
Comments
13 min read
NGINX vs Apache : A Comparison of Web Servers

NGINX vs Apache : A Comparison of Web Servers

7
Comments 2
3 min read
A Dualidade do Bitcoin: Privacidade versus TransparĂŞncia

A Dualidade do Bitcoin: Privacidade versus TransparĂŞncia

9
Comments
4 min read
Building a SvelteKit Demo Page with Web Component and Passkey Login for passkeys.eu

Building a SvelteKit Demo Page with Web Component and Passkey Login for passkeys.eu

3
Comments
9 min read
Passkeys: What the Heck and Why?

Passkeys: What the Heck and Why?

1
Comments
12 min read
Improve AWS security and compliance with cdk-nag

Improve AWS security and compliance with cdk-nag

3
Comments
6 min read
Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

Data Breaches and Healthcare: Is India Lacking in Healthcare Data Security?

2
Comments
4 min read
How to implement a Mesh Network on AWS

How to implement a Mesh Network on AWS

13
Comments 1
9 min read
A beginner's guide to Termius: the ultimate terminal

A beginner's guide to Termius: the ultimate terminal

70
Comments 10
3 min read
Six security risks of user input in ruby code

Six security risks of user input in ruby code

Comments
4 min read
Managing network security aspects in the public cloud

Managing network security aspects in the public cloud

2
Comments
4 min read
System Design : Vertical And Horizontal Scaling

System Design : Vertical And Horizontal Scaling

Comments 1
2 min read
Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 2.

Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 2.

1
Comments
3 min read
Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 1.

Use Firebase Auth to Manage User Permissions and Enforce Principle of Least Privilege on API Endpoints. Part 1.

Comments
4 min read
Unlocking the Power of Linux Capabilities: Exposing Port 80 without Root Access

Unlocking the Power of Linux Capabilities: Exposing Port 80 without Root Access

2
Comments
3 min read
Spring Security Lambda DSL

Spring Security Lambda DSL

5
Comments 1
4 min read
Announcing Lucia 1.0 - A simple and flexible auth library with support for multiple databases and frameworks

Announcing Lucia 1.0 - A simple and flexible auth library with support for multiple databases and frameworks

1
Comments
2 min read
Unlocking Zero Knowledge Proofs: From Beginner to Advanced

Unlocking Zero Knowledge Proofs: From Beginner to Advanced

2
Comments
5 min read
Setting up SSL Certificates for HAProxy with Let’s Encrypt

Setting up SSL Certificates for HAProxy with Let’s Encrypt

3
Comments
5 min read
Effective Security & Authentication for a modern full stack Web Application

Effective Security & Authentication for a modern full stack Web Application

2
Comments 2
5 min read
7 Ways to Protect Your Data in Event-Driven Architectures

7 Ways to Protect Your Data in Event-Driven Architectures

2
Comments
4 min read
Exploring Google Zanzibar: A Demonstration of Its Basics

Exploring Google Zanzibar: A Demonstration of Its Basics

39
Comments 2
12 min read
Como usar autenticação 2 fatores no GitHub

Como usar autenticação 2 fatores no GitHub

27
Comments 1
3 min read
AWS SSO & GitHub OpenID Connect Setup

AWS SSO & GitHub OpenID Connect Setup

5
Comments
4 min read
How to Handle AWS Secrets

How to Handle AWS Secrets

1
Comments
6 min read
A web security story from 2008: silently securing JSON.parse

A web security story from 2008: silently securing JSON.parse

7
Comments 1
5 min read
Notes from competing in my first CTF

Notes from competing in my first CTF

32
Comments 4
4 min read
Security sinks in Ruby on Rails Part 1 - XSS

Security sinks in Ruby on Rails Part 1 - XSS

1
Comments
2 min read
Understanding the nature of XSS

Understanding the nature of XSS

Comments
6 min read
Enhance Server Security: Configuring SSH to Listen on a Non-Default Port and Enabling Public-Key Authentication

Enhance Server Security: Configuring SSH to Listen on a Non-Default Port and Enabling Public-Key Authentication

2
Comments
4 min read
Asymmetric Cryptography with Golang

Asymmetric Cryptography with Golang

21
Comments
3 min read
Guide to Face Detection and Recognition Software Development

Guide to Face Detection and Recognition Software Development

7
Comments 1
15 min read
Store JWT Token with Coroutines

Store JWT Token with Coroutines

22
Comments
2 min read
#Angular Adventure: Mastering Secure Local Storage in Angular with Crypto-js

#Angular Adventure: Mastering Secure Local Storage in Angular with Crypto-js

6
Comments 8
4 min read
loading...