DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Spring Security and OpenID Connect

Spring Security and OpenID Connect

1
Comments
8 min read
I'm deleting all of my AWS IAM keys

I'm deleting all of my AWS IAM keys

3
Comments 1
6 min read
Automated Fuzz Testing: The Power of Code Intelligence App

Automated Fuzz Testing: The Power of Code Intelligence App

8
Comments
5 min read
A Guide to DevSecOps with API Gateway

A Guide to DevSecOps with API Gateway

28
Comments
6 min read
Things I thought I should be careful about when writing my own XSS penetration tests.

Things I thought I should be careful about when writing my own XSS penetration tests.

Comments
6 min read
Use OAuth 2.0 and Open ID Connect in a Custom Application

Use OAuth 2.0 and Open ID Connect in a Custom Application

2
Comments
7 min read
10 Mistakes StartUp Founders Make when Getting Started on AWS

10 Mistakes StartUp Founders Make when Getting Started on AWS

8
Comments
9 min read
IAM Roles Anywhere: Introduction and Demo

IAM Roles Anywhere: Introduction and Demo

2
Comments 1
7 min read
Best Practices for Securing Kubernetes Deployments

Best Practices for Securing Kubernetes Deployments

32
Comments 3
5 min read
5 ways for GitLab CI runners to get AWS credentials

5 ways for GitLab CI runners to get AWS credentials

16
Comments 2
11 min read
Preventing SQL Injection Attacks: Best Practices for Developers

Preventing SQL Injection Attacks: Best Practices for Developers

Comments
4 min read
How to Use a Script to Hide Data in Video Files

How to Use a Script to Hide Data in Video Files

2
Comments
2 min read
Start using STRONG PASSWORDS in Laravel | Tutorial | Quick Win Wednesday #QWW

Start using STRONG PASSWORDS in Laravel | Tutorial | Quick Win Wednesday #QWW

Comments
1 min read
Securing Data Lake in AWS

Securing Data Lake in AWS

7
Comments
5 min read
Como pegar os resultados do DAST em um pipeline?

Como pegar os resultados do DAST em um pipeline?

Comments
2 min read
Java Serialization Filtering - Prevent 0-day Security Vulnerabilities

Java Serialization Filtering - Prevent 0-day Security Vulnerabilities

7
Comments
4 min read
Rotation keys in Golang

Rotation keys in Golang

4
Comments
4 min read
So, I developed an instant messaging app with E2EE

So, I developed an instant messaging app with E2EE

Comments
4 min read
A Complete Guide to Database Security Testing

A Complete Guide to Database Security Testing

7
Comments 1
3 min read
Passwordless Authentication made easy with Cognito: a step-by-step guide

Passwordless Authentication made easy with Cognito: a step-by-step guide

1
Comments
11 min read
How to protect a website against DoS Attack using AWS WAF v2

How to protect a website against DoS Attack using AWS WAF v2

4
Comments
2 min read
Keeping Your WordPress Website Safe and Secure with WP White Security

Keeping Your WordPress Website Safe and Secure with WP White Security

2
Comments 1
7 min read
A Detailed Introduction to JWT Authentication and Authorization

A Detailed Introduction to JWT Authentication and Authorization

2
Comments
5 min read
A Beginner's Guide to Vault: Understanding Secrets, Credentials, and Secure Data Management

A Beginner's Guide to Vault: Understanding Secrets, Credentials, and Secure Data Management

4
Comments
7 min read
Confidential Optical Character Recognition Service With Cape

Confidential Optical Character Recognition Service With Cape

1
Comments
7 min read
Authenticate with OpenID Connect and Apache APISIX

Authenticate with OpenID Connect and Apache APISIX

35
Comments
6 min read
Boas práticas de segurança para AWS CLI

Boas práticas de segurança para AWS CLI

1
Comments
3 min read
Secure Your PHP Code With Taint Analysis by Qodana

Secure Your PHP Code With Taint Analysis by Qodana

Comments
5 min read
Preventing Data Breaches in React Applications with Supabase

Preventing Data Breaches in React Applications with Supabase

1
Comments
6 min read
Reinventing IBM | DevSecOps, AI, Quantum Computing

Reinventing IBM | DevSecOps, AI, Quantum Computing

18
Comments 1
2 min read
Scalable, Producer-Consumer-based, Remote Log Monitor in Python

Scalable, Producer-Consumer-based, Remote Log Monitor in Python

2
Comments
4 min read
Spring Security OAuth2 Login

Spring Security OAuth2 Login

7
Comments
9 min read
Adding Multi-Account Support to Your Product With PropelAuth

Adding Multi-Account Support to Your Product With PropelAuth

2
Comments
4 min read
Mitigating path traversal vulns in Java with Snyk Code

Mitigating path traversal vulns in Java with Snyk Code

1
Comments
4 min read
Django Bootstrap Login Template (How-To)

Django Bootstrap Login Template (How-To)

1
Comments
4 min read
Networking: Definition, Importance and Types

Networking: Definition, Importance and Types

1
Comments
3 min read
Analisando IaC e Containers com Veracode

Analisando IaC e Containers com Veracode

Comments
2 min read
What Does Passwordless Actually Mean?

What Does Passwordless Actually Mean?

2
Comments
2 min read
Our guide to the AWS Security Pillar

Our guide to the AWS Security Pillar

1
Comments
7 min read
Choosing Between SOCKS vs HTTP Proxy

Choosing Between SOCKS vs HTTP Proxy

Comments
9 min read
Private Networking in Azure: The Key to Data Exfiltration Prevention

Private Networking in Azure: The Key to Data Exfiltration Prevention

5
Comments
5 min read
Introducing Amazon Inspector code scans for Lambda functions

Introducing Amazon Inspector code scans for Lambda functions

5
Comments
4 min read
Maintaining a Monorepo: Strategies for Managing Dependencies and Updating Packages

Maintaining a Monorepo: Strategies for Managing Dependencies and Updating Packages

2
Comments
3 min read
QuillCTF: 7. True XOR

QuillCTF: 7. True XOR

Comments
2 min read
Great Analogy To Explain ID Tokens Vs Access Tokens

Great Analogy To Explain ID Tokens Vs Access Tokens

1
Comments
2 min read
Here's Why Authentication Should Not Be Rocket Science

Here's Why Authentication Should Not Be Rocket Science

2
Comments
6 min read
Detecting Security Threats in Real-time with AWS GuardDuty

Detecting Security Threats in Real-time with AWS GuardDuty

2
Comments
3 min read
Hacking 101: Common Attacks and How to Stop Them

Hacking 101: Common Attacks and How to Stop Them

1
Comments
5 min read
PHP File Upload: Check uploaded files with magic bytes

PHP File Upload: Check uploaded files with magic bytes

8
Comments 3
5 min read
Transport Layer Security (TLS), Public & Private Keys

Transport Layer Security (TLS), Public & Private Keys

7
Comments
4 min read
RBAC Authorization with FastAPI and PropelAuth

RBAC Authorization with FastAPI and PropelAuth

5
Comments
3 min read
HelmetJS and SwaggerUI: Avoiding headaches in your NodeJS app

HelmetJS and SwaggerUI: Avoiding headaches in your NodeJS app

3
Comments
3 min read
What is Hashicorp Vault? Manage your secrets in production.

What is Hashicorp Vault? Manage your secrets in production.

1
Comments
2 min read
Is your Flutter application Secured? Best Practices for Developing and Deploying Secure Flutter Apps

Is your Flutter application Secured? Best Practices for Developing and Deploying Secure Flutter Apps

17
Comments 4
7 min read
Generate Random Password for users in your App — Building with Flutter

Generate Random Password for users in your App — Building with Flutter

Comments
5 min read
How to Enable 2FA for your GitHub Account 

How to Enable 2FA for your GitHub Account 

27
Comments
4 min read
Authorization Code Flow with Proof Key for Code Exchange (PKCE)

Authorization Code Flow with Proof Key for Code Exchange (PKCE)

7
Comments
8 min read
How to prevent scrapers from crawling your website data using rotating proxy IPs

How to prevent scrapers from crawling your website data using rotating proxy IPs

2
Comments 1
3 min read
Make your security policy auditable

Make your security policy auditable

13
Comments
8 min read
Best practice for artifacts downloading

Best practice for artifacts downloading

Comments
3 min read
loading...