DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Attacking CI/CD Tools The Crown Jewels — Series 2

Attacking CI/CD Tools The Crown Jewels — Series 2

3
Comments
1 min read
Attacking CI/CD Tools The Crown Jewels — Series 1

Attacking CI/CD Tools The Crown Jewels — Series 1

3
Comments
1 min read
Licensed Revoked; Certificate Status Checking in PKIX

Licensed Revoked; Certificate Status Checking in PKIX

21
Comments
4 min read
OAuth for Dummies

OAuth for Dummies

73
Comments 4
2 min read
SDK for Private & Ethical Access to Personal Data

SDK for Private & Ethical Access to Personal Data

3
Comments
1 min read
What is a WAF?

What is a WAF?

18
Comments 1
2 min read
7 Cloud Computing Security Vulnerabilities and What to Do About Them

7 Cloud Computing Security Vulnerabilities and What to Do About Them

13
Comments
10 min read
What is Encryption?

What is Encryption?

22
Comments 7
5 min read
Forging JSON Web Tokens To Win a Prize

Forging JSON Web Tokens To Win a Prize

13
Comments 3
5 min read
A Helpful Resource on Securely Connecting Google Analytics to Gatsby

A Helpful Resource on Securely Connecting Google Analytics to Gatsby

2
Comments
1 min read
5 Non-Technical Ways to Protect Your WordPress Website from Hackers

5 Non-Technical Ways to Protect Your WordPress Website from Hackers

4
Comments 2
2 min read
Did You Know There Are Different Types of Certs for HTTPS?

Did You Know There Are Different Types of Certs for HTTPS?

25
Comments 9
2 min read
Gitcoin + Matic: A Staking Partnership

Gitcoin + Matic: A Staking Partnership

3
Comments
3 min read
How to scan local files for secrets in python using the GitGuardian API

How to scan local files for secrets in python using the GitGuardian API

6
Comments
9 min read
Mobile App Security Vulnerabilities and How to Mitigate Them

Mobile App Security Vulnerabilities and How to Mitigate Them

2
Comments
1 min read
Social Authentication or Not?

Social Authentication or Not?

2
Comments 4
1 min read
OWASP Top 10 Mobile Vulnerabilities Developers Need to Understand

OWASP Top 10 Mobile Vulnerabilities Developers Need to Understand

10
Comments
6 min read
Clickjacking attack Protection

Clickjacking attack Protection

6
Comments
2 min read
Tsurugi Linux - Device Unlocker Code Review

Tsurugi Linux - Device Unlocker Code Review

2
Comments
1 min read
JavaScript Security Pitfalls

JavaScript Security Pitfalls

13
Comments 2
2 min read
DevSecOps – the key to avoid security breaches

DevSecOps – the key to avoid security breaches

3
Comments
5 min read
Two tests you should run against your Ruby project now

Two tests you should run against your Ruby project now

11
Comments
3 min read
Days 1 and 2 - Auth

Days 1 and 2 - Auth

2
Comments
1 min read
Hardening Server Security By Implementing Security Headers

Hardening Server Security By Implementing Security Headers

11
Comments
2 min read
OverTheWire :- Bandit (Level 15–20) [CTF]

OverTheWire :- Bandit (Level 15–20) [CTF]

5
Comments
4 min read
loading...