DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Rust Realtime OTP Algorithm

Rust Realtime OTP Algorithm

7
Comments 1
2 min read
Serverless querying and evaluating of Logs using Athena Part 2

Serverless querying and evaluating of Logs using Athena Part 2

4
Comments
2 min read
Building a multitenant web application with Spring Boot

Building a multitenant web application with Spring Boot

22
Comments
9 min read
Setup CloudFront & Amazon S3 to Deliver objects on the Web Apps (securely & efficiently)

Setup CloudFront & Amazon S3 to Deliver objects on the Web Apps (securely & efficiently)

46
Comments 1
6 min read
Comparing Confidential Computing Alternatives in the Cloud

Comparing Confidential Computing Alternatives in the Cloud

5
Comments 3
4 min read
A Beginner's Guide to AWS Virtual Private Cloud (VPC) Security

A Beginner's Guide to AWS Virtual Private Cloud (VPC) Security

5
Comments 2
4 min read
Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide

Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide

6
Comments
14 min read
Using OpenId Connect with Confluent Cloud

Using OpenId Connect with Confluent Cloud

2
Comments
4 min read
How To Prevent HPP and XSS Attacks In Nodejs

How To Prevent HPP and XSS Attacks In Nodejs

8
Comments
2 min read
ChatGPT creating OSS security rules and plugins

ChatGPT creating OSS security rules and plugins

1
Comments
11 min read
Spring Security and OpenID Connect

Spring Security and OpenID Connect

1
Comments
8 min read
I'm deleting all of my AWS IAM keys

I'm deleting all of my AWS IAM keys

3
Comments 1
6 min read
Automated Fuzz Testing: The Power of Code Intelligence App

Automated Fuzz Testing: The Power of Code Intelligence App

8
Comments
5 min read
A Guide to DevSecOps with API Gateway

A Guide to DevSecOps with API Gateway

28
Comments
6 min read
Things I thought I should be careful about when writing my own XSS penetration tests.

Things I thought I should be careful about when writing my own XSS penetration tests.

Comments
6 min read
Use OAuth 2.0 and Open ID Connect in a Custom Application

Use OAuth 2.0 and Open ID Connect in a Custom Application

2
Comments
7 min read
10 Mistakes StartUp Founders Make when Getting Started on AWS

10 Mistakes StartUp Founders Make when Getting Started on AWS

8
Comments
9 min read
IAM Roles Anywhere: Introduction and Demo

IAM Roles Anywhere: Introduction and Demo

2
Comments 1
7 min read
Best Practices for Securing Kubernetes Deployments

Best Practices for Securing Kubernetes Deployments

32
Comments 3
5 min read
5 ways for GitLab CI runners to get AWS credentials

5 ways for GitLab CI runners to get AWS credentials

15
Comments 2
11 min read
Preventing SQL Injection Attacks: Best Practices for Developers

Preventing SQL Injection Attacks: Best Practices for Developers

Comments
4 min read
How to Use a Script to Hide Data in Video Files

How to Use a Script to Hide Data in Video Files

2
Comments
2 min read
Securing Data Lake in AWS

Securing Data Lake in AWS

7
Comments
5 min read
Start using STRONG PASSWORDS in Laravel | Tutorial | Quick Win Wednesday #QWW

Start using STRONG PASSWORDS in Laravel | Tutorial | Quick Win Wednesday #QWW

Comments
1 min read
Como pegar os resultados do DAST em um pipeline?

Como pegar os resultados do DAST em um pipeline?

Comments
2 min read
Java Serialization Filtering - Prevent 0-day Security Vulnerabilities

Java Serialization Filtering - Prevent 0-day Security Vulnerabilities

7
Comments
4 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
So, I developed an instant messaging app with E2EE

So, I developed an instant messaging app with E2EE

Comments
4 min read
A Complete Guide to Database Security Testing

A Complete Guide to Database Security Testing

7
Comments 1
3 min read
Passwordless Authentication made easy with Cognito: a step-by-step guide

Passwordless Authentication made easy with Cognito: a step-by-step guide

1
Comments
11 min read
How to protect a website against DoS Attack using AWS WAF v2

How to protect a website against DoS Attack using AWS WAF v2

4
Comments
2 min read
Keeping Your WordPress Website Safe and Secure with WP White Security

Keeping Your WordPress Website Safe and Secure with WP White Security

2
Comments 1
7 min read
A Detailed Introduction to JWT Authentication and Authorization

A Detailed Introduction to JWT Authentication and Authorization

2
Comments
5 min read
A Beginner's Guide to Vault: Understanding Secrets, Credentials, and Secure Data Management

A Beginner's Guide to Vault: Understanding Secrets, Credentials, and Secure Data Management

4
Comments
7 min read
Confidential Optical Character Recognition Service With Cape

Confidential Optical Character Recognition Service With Cape

1
Comments
7 min read
Authenticate with OpenID Connect and Apache APISIX

Authenticate with OpenID Connect and Apache APISIX

35
Comments
6 min read
Boas práticas de segurança para AWS CLI

Boas práticas de segurança para AWS CLI

1
Comments
3 min read
Secure Your PHP Code With Taint Analysis by Qodana

Secure Your PHP Code With Taint Analysis by Qodana

Comments
5 min read
Preventing Data Breaches in React Applications with Supabase

Preventing Data Breaches in React Applications with Supabase

1
Comments
6 min read
Reinventing IBM | DevSecOps, AI, Quantum Computing

Reinventing IBM | DevSecOps, AI, Quantum Computing

17
Comments 1
2 min read
Scalable, Producer-Consumer-based, Remote Log Monitor in Python

Scalable, Producer-Consumer-based, Remote Log Monitor in Python

2
Comments
4 min read
Spring Security OAuth2 Login

Spring Security OAuth2 Login

7
Comments
9 min read
Adding Multi-Account Support to Your Product With PropelAuth

Adding Multi-Account Support to Your Product With PropelAuth

2
Comments
4 min read
Mitigating path traversal vulns in Java with Snyk Code

Mitigating path traversal vulns in Java with Snyk Code

1
Comments
4 min read
Django Bootstrap Login Template (How-To)

Django Bootstrap Login Template (How-To)

1
Comments
4 min read
Networking: Definition, Importance and Types

Networking: Definition, Importance and Types

1
Comments
3 min read
Analisando IaC e Containers com Veracode

Analisando IaC e Containers com Veracode

Comments
2 min read
What Does Passwordless Actually Mean?

What Does Passwordless Actually Mean?

2
Comments
2 min read
Our guide to the AWS Security Pillar

Our guide to the AWS Security Pillar

1
Comments
7 min read
Choosing Between SOCKS vs HTTP Proxy

Choosing Between SOCKS vs HTTP Proxy

Comments
9 min read
Private Networking in Azure: The Key to Data Exfiltration Prevention

Private Networking in Azure: The Key to Data Exfiltration Prevention

5
Comments
5 min read
Introducing Amazon Inspector code scans for Lambda functions

Introducing Amazon Inspector code scans for Lambda functions

5
Comments
4 min read
Maintaining a Monorepo: Strategies for Managing Dependencies and Updating Packages

Maintaining a Monorepo: Strategies for Managing Dependencies and Updating Packages

2
Comments
3 min read
QuillCTF: 7. True XOR

QuillCTF: 7. True XOR

Comments
2 min read
Great Analogy To Explain ID Tokens Vs Access Tokens

Great Analogy To Explain ID Tokens Vs Access Tokens

1
Comments
2 min read
Here's Why Authentication Should Not Be Rocket Science

Here's Why Authentication Should Not Be Rocket Science

2
Comments
6 min read
Detecting Security Threats in Real-time with AWS GuardDuty

Detecting Security Threats in Real-time with AWS GuardDuty

2
Comments
3 min read
Hacking 101: Common Attacks and How to Stop Them

Hacking 101: Common Attacks and How to Stop Them

1
Comments
5 min read
PHP File Upload: Check uploaded files with magic bytes

PHP File Upload: Check uploaded files with magic bytes

8
Comments 3
5 min read
Transport Layer Security (TLS), Public & Private Keys

Transport Layer Security (TLS), Public & Private Keys

7
Comments
4 min read
loading...