DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
10 steps to secure your Laravel Application

10 steps to secure your Laravel Application

2
Comments 1
2 min read
The essential security checklist for user identity

The essential security checklist for user identity

5
Comments
6 min read
In-App Authentication Made Easy With Biometric API

In-App Authentication Made Easy With Biometric API

Comments
3 min read
Building Secure Docker Images for Production - Best Practices

Building Secure Docker Images for Production - Best Practices

25
Comments 4
7 min read
php[tek] 2023 - A Community Of Communities Powering The Internet

php[tek] 2023 - A Community Of Communities Powering The Internet

2
Comments
9 min read
GitHub Pages: Custom Domains and SSL

GitHub Pages: Custom Domains and SSL

3
Comments
4 min read
ChatGPT at Work: How to block Content Leaks đź”’

ChatGPT at Work: How to block Content Leaks đź”’

3
Comments
2 min read
Docker Secrets Best Practices: Protecting Sensitive Information in Containers

Docker Secrets Best Practices: Protecting Sensitive Information in Containers

13
Comments 2
6 min read
Updating Security Groups in AWS ECS on Fargate

Updating Security Groups in AWS ECS on Fargate

3
Comments
2 min read
Overview of Pentesting Phases

Overview of Pentesting Phases

5
Comments
2 min read
Information Gathering

Information Gathering

6
Comments
2 min read
Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

Securing Lambda to ELB Connections with HTTPS using AWS Certificate Manager (ACM)

2
Comments
4 min read
Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Stealth in Science: Leveraging Zero-Knowledge Proofs to Safeguard Drug Design Intellectual Property

Comments
3 min read
Unveiling the Power of AI in Software Security at DevSecCon

Unveiling the Power of AI in Software Security at DevSecCon

2
Comments 1
3 min read
Serve your hash with Salt and Pepper for Stronger Account Security

Serve your hash with Salt and Pepper for Stronger Account Security

2
Comments 1
6 min read
Simplify Password Management with the 'pass' Command-Line Password Manager

Simplify Password Management with the 'pass' Command-Line Password Manager

10
Comments 2
2 min read
Securely Storing API Keys in Flutter

Securely Storing API Keys in Flutter

13
Comments 2
2 min read
A Comprehensive Guide to Cookies and Sessions in Web Development with Python

A Comprehensive Guide to Cookies and Sessions in Web Development with Python

5
Comments
4 min read
Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

Enhancing S3 Bucket Security: Unleashing the Power of Dual-Layer Server-Side Encryption

1
Comments
3 min read
Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

Pillars of Spring Security: A Pre-Authentication component in a complex scenario.

4
Comments
3 min read
Phishing Attacks Explained: Protecting Yourself from Online Scams

Phishing Attacks Explained: Protecting Yourself from Online Scams

1
Comments
3 min read
Remotely Connect to Your Instances without a Public IP Address

Remotely Connect to Your Instances without a Public IP Address

3
Comments 4
3 min read
Gerenciando SD Elements com o Jira

Gerenciando SD Elements com o Jira

2
Comments
1 min read
Understanding Security Vulnerabilities: A First Step in Preventing Attacks

Understanding Security Vulnerabilities: A First Step in Preventing Attacks

10
Comments
8 min read
How to Detect and Fix Kubernetes Misconfigurations

How to Detect and Fix Kubernetes Misconfigurations

3
Comments
5 min read
Flex your muscles 🧠💪

Flex your muscles 🧠💪

1
Comments
2 min read
Hello spiderfoot

Hello spiderfoot

Comments
1 min read
Will passkeys kill password managers?

Will passkeys kill password managers?

3
Comments 2
2 min read
Understanding Authorization Before Authentication: Enhancing Web API Security

Understanding Authorization Before Authentication: Enhancing Web API Security

35
Comments
4 min read
Amazon Verified Permissions

Amazon Verified Permissions

Comments
2 min read
How does JWT work?

How does JWT work?

6
Comments
1 min read
SSL para SaaS com multiplos domĂ­nios usando Docker e Caddy

SSL para SaaS com multiplos domĂ­nios usando Docker e Caddy

3
Comments
2 min read
Revolutionize authentication through the 1Password Hackathon

Revolutionize authentication through the 1Password Hackathon

9
Comments
4 min read
Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Keep It Secret, Keep It Safe: How To Use GitHub Actions Secrets To Hide Sensitive Data

Comments
5 min read
Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Fortifying the Digital Landscape: Safeguarding Cybersecurity and Protecting Data Privacy

Comments
3 min read
Software Security with Laurie Williams

Software Security with Laurie Williams

2
Comments
2 min read
Jump-Box EC2 101: Unlocking Secure Access to Private Resources

Jump-Box EC2 101: Unlocking Secure Access to Private Resources

4
Comments
4 min read
The Reddit blackout is a lesson in risk management

The Reddit blackout is a lesson in risk management

22
Comments 28
3 min read
Single Sign On protocols: SAML vs OpenID Connect

Single Sign On protocols: SAML vs OpenID Connect

3
Comments 1
4 min read
Easter Eggs!

Easter Eggs!

1
Comments 1
3 min read
AWS and Cyber Insurance

AWS and Cyber Insurance

2
Comments
2 min read
Regular Expression Denial of Service (ReDoS)

Regular Expression Denial of Service (ReDoS)

1
Comments 1
1 min read
How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
Debugging SQS subscription issues to topics

Debugging SQS subscription issues to topics

2
Comments
4 min read
AWS IAM CLI: a cheatsheet

AWS IAM CLI: a cheatsheet

15
Comments
9 min read
Como utilizar a ferramenta de UM

Como utilizar a ferramenta de UM

1
Comments
2 min read
Veracode Upload & Scan Deep Dive

Veracode Upload & Scan Deep Dive

2
Comments
5 min read
[Solidity] Reentrancy vulnerability

[Solidity] Reentrancy vulnerability

1
Comments
2 min read
Build Safer Docker Images

Build Safer Docker Images

4
Comments 3
2 min read
Shared Security Architecture for Cloud

Shared Security Architecture for Cloud

1
Comments
6 min read
Mastering AWS IAM: Best Practices for Secure Access Management

Mastering AWS IAM: Best Practices for Secure Access Management

Comments
3 min read
SCA Agent-Based Deep Dive

SCA Agent-Based Deep Dive

4
Comments
4 min read
Como proteger aplicações React contra ataques de cross-site scripting (XSS)

Como proteger aplicações React contra ataques de cross-site scripting (XSS)

1
Comments
3 min read
Let's discuss a Password Manager for the Apocalypse Era.

Let's discuss a Password Manager for the Apocalypse Era.

2
Comments 1
1 min read
Unlocking the Potential of FORTIFY_SOURCE

Unlocking the Potential of FORTIFY_SOURCE

Comments
4 min read
How to restrict a user to use single region in AWS

How to restrict a user to use single region in AWS

Comments
1 min read
How to enforce MFA in AWS - Part I - Create User, Role & Policy

How to enforce MFA in AWS - Part I - Create User, Role & Policy

Comments
2 min read
How to enforce MFA in AWS - Part II - Using `aws` CLI and terraform with MFA

How to enforce MFA in AWS - Part II - Using `aws` CLI and terraform with MFA

2
Comments
2 min read
Analyzing the HamsterWheel: An Advanced State Management Vulnerability in Sui's Blockchain Architecture

Analyzing the HamsterWheel: An Advanced State Management Vulnerability in Sui's Blockchain Architecture

Comments
12 min read
Orchestrate your Organization around Best Practices, Security, Audit & Account Management using AWS Control Tower

Orchestrate your Organization around Best Practices, Security, Audit & Account Management using AWS Control Tower

1
Comments
3 min read
loading...