DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HelmetJS and SwaggerUI: Avoiding headaches in your NodeJS app

HelmetJS and SwaggerUI: Avoiding headaches in your NodeJS app

3
Comments
3 min read
What is Hashicorp Vault? Manage your secrets in production.

What is Hashicorp Vault? Manage your secrets in production.

1
Comments
2 min read
Is your Flutter application Secured? Best Practices for Developing and Deploying Secure Flutter Apps

Is your Flutter application Secured? Best Practices for Developing and Deploying Secure Flutter Apps

16
Comments 4
7 min read
Generate Random Password for users in your App — Building with Flutter

Generate Random Password for users in your App — Building with Flutter

Comments
5 min read
How to Enable 2FA for your GitHub Account 

How to Enable 2FA for your GitHub Account 

27
Comments
4 min read
Authorization Code Flow with Proof Key for Code Exchange (PKCE)

Authorization Code Flow with Proof Key for Code Exchange (PKCE)

6
Comments
8 min read
How to prevent scrapers from crawling your website data using rotating proxy IPs

How to prevent scrapers from crawling your website data using rotating proxy IPs

2
Comments 1
3 min read
Make your security policy auditable

Make your security policy auditable

13
Comments
8 min read
Best practice for artifacts downloading

Best practice for artifacts downloading

Comments
3 min read
Prevent Your Go Web Applications from Being Hacked with This Simple Tool

Prevent Your Go Web Applications from Being Hacked with This Simple Tool

Comments
2 min read
I made inline styles CSP-compliant in .NET 6+. Here's how

I made inline styles CSP-compliant in .NET 6+. Here's how

4
Comments 2
6 min read
AWS Patch Management

AWS Patch Management

3
Comments
4 min read
Supply Chain Security: What is SLSA? (Part I)

Supply Chain Security: What is SLSA? (Part I)

Comments 1
10 min read
Speed Up Cypress Testing of NextAuth Secured Web Apps

Speed Up Cypress Testing of NextAuth Secured Web Apps

3
Comments
4 min read
Choosing Between Role-Based vs Claims-Based vs Permission-Based Access Control Mechanism

Choosing Between Role-Based vs Claims-Based vs Permission-Based Access Control Mechanism

1
Comments
6 min read
O que é "vulnerabilidade de atribuição em massa"?

O que é "vulnerabilidade de atribuição em massa"?

6
Comments
2 min read
Exposing Databases to the Internet: Seriously?

Exposing Databases to the Internet: Seriously?

32
Comments 4
5 min read
Modelagem de Ameaças -Decompondo o Aplicativo

Modelagem de Ameaças -Decompondo o Aplicativo

2
Comments
7 min read
Setup External Secrets with Hashicorp Vault on AWS EKS

Setup External Secrets with Hashicorp Vault on AWS EKS

1
Comments
6 min read
Avoid a Malicious Attack MongoDB: How It Happened and What We Did About It.

Avoid a Malicious Attack MongoDB: How It Happened and What We Did About It.

7
Comments 6
2 min read
Mastering Cloud Computing: Your Step-by-Step Roadmap to Success

Mastering Cloud Computing: Your Step-by-Step Roadmap to Success

Comments 1
4 min read
Securing Your Website: Protecting Against Top Cyber Attacks

Securing Your Website: Protecting Against Top Cyber Attacks

Comments
3 min read
Don't let security slow you down, use it to go faster

Don't let security slow you down, use it to go faster

4
Comments
3 min read
Terminologias Utilizadas em Modelagem de Ameaças

Terminologias Utilizadas em Modelagem de Ameaças

2
Comments
4 min read
Create Robust Access Control in Your Flask Application using Flask-login & Permify

Create Robust Access Control in Your Flask Application using Flask-login & Permify

15
Comments 2
16 min read
Tools Used to Test and Detect Application Security Vulnerabilities

Tools Used to Test and Detect Application Security Vulnerabilities

20
Comments
6 min read
How to Implement the Producer-Consumer Concurrency Design Pattern with asyncio Coroutines

How to Implement the Producer-Consumer Concurrency Design Pattern with asyncio Coroutines

1
Comments 1
6 min read
Spring Security and Non-flat Roles Inheritance Architecture

Spring Security and Non-flat Roles Inheritance Architecture

17
Comments 3
17 min read
A Guide to Implementing Passwordless Login

A Guide to Implementing Passwordless Login

10
Comments 3
4 min read
What's Carrier Gateway is AWS?

What's Carrier Gateway is AWS?

3
Comments
2 min read
JWT's for authentication

JWT's for authentication

1
Comments
5 min read
Mastering GPG: The Essential Tool for Secure Communications in Software Development

Mastering GPG: The Essential Tool for Secure Communications in Software Development

2
Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
Modelagem de Ameaças - Introdução

Modelagem de Ameaças - Introdução

2
Comments
3 min read
Top 10 Practices for Secure Software Development

Top 10 Practices for Secure Software Development

1
Comments
9 min read
Using Google Tink to sign JWTs with ECDSA

Using Google Tink to sign JWTs with ECDSA

1
Comments
12 min read
SSL/TLS Configuration

SSL/TLS Configuration

2
Comments
3 min read
Protect your React Native application using Cloudflare Turnstile.

Protect your React Native application using Cloudflare Turnstile.

7
Comments
2 min read
Spring Security OAuth2 Client Credentials Grant

Spring Security OAuth2 Client Credentials Grant

11
Comments
5 min read
🔒Improve Bitwarden Enterprise management with Google SSO

🔒Improve Bitwarden Enterprise management with Google SSO

6
Comments
9 min read
Securizing your GitHub org

Securizing your GitHub org

19
Comments 1
6 min read
How to connect to a distant server using SSH

How to connect to a distant server using SSH

1
Comments
4 min read
Improving the Security of JSON Web Tokens (JWTs)

Improving the Security of JSON Web Tokens (JWTs)

4
Comments
3 min read
Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

3
Comments
7 min read
A lesser-known vector for XSS attacks: SVG files

A lesser-known vector for XSS attacks: SVG files

4
Comments
2 min read
Spring Security Persistent OAuth2 Client

Spring Security Persistent OAuth2 Client

4
Comments 2
6 min read
Improving security in HTTPS communication

Improving security in HTTPS communication

4
Comments
7 min read
Is your Cloud Native Application Secure?

Is your Cloud Native Application Secure?

9
Comments 4
4 min read
Implementing the right Email Verification flow

Implementing the right Email Verification flow

25
Comments 1
6 min read
Laravel Security

Laravel Security

Comments
3 min read
CĂłmo lograr un gobierno de mĂșltiples cuentas a escala con AWS Control Tower - Parte 2

CĂłmo lograr un gobierno de mĂșltiples cuentas a escala con AWS Control Tower - Parte 2

4
Comments
9 min read
Generate JWT Tokens in 3 Easy Steps in .Net

Generate JWT Tokens in 3 Easy Steps in .Net

5
Comments
4 min read
Desenvolvimento Seguro, S-SDLC

Desenvolvimento Seguro, S-SDLC

2
Comments
5 min read
OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

1
Comments
3 min read
Securing Your Web Applications with PHP OOP and PDO

Securing Your Web Applications with PHP OOP and PDO

1
Comments
9 min read
Customize the OAuth2 Authorization Consent Page

Customize the OAuth2 Authorization Consent Page

2
Comments
5 min read
The Data You‘ve Left Behind – an Attacker‘s Perspective

The Data You‘ve Left Behind – an Attacker‘s Perspective

1
Comments
7 min read
Expecto Strong Passwords: Enchant Your Online Security with a JavaScript Password Bookmarklet

Expecto Strong Passwords: Enchant Your Online Security with a JavaScript Password Bookmarklet

Comments
3 min read
loading...