DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Prevent Your Go Web Applications from Being Hacked with This Simple Tool

Prevent Your Go Web Applications from Being Hacked with This Simple Tool

Comments
2 min read
I made inline styles CSP-compliant in .NET 6+. Here's how

I made inline styles CSP-compliant in .NET 6+. Here's how

4
Comments 2
6 min read
AWS Patch Management

AWS Patch Management

3
Comments
4 min read
Supply Chain Security: What is SLSA? (Part I)

Supply Chain Security: What is SLSA? (Part I)

Comments 1
10 min read
Choosing Between Role-Based vs Claims-Based vs Permission-Based Access Control Mechanism

Choosing Between Role-Based vs Claims-Based vs Permission-Based Access Control Mechanism

1
Comments
6 min read
Speed Up Cypress Testing of NextAuth Secured Web Apps

Speed Up Cypress Testing of NextAuth Secured Web Apps

3
Comments
4 min read
Kerberos overview: Introducing network authentication

Kerberos overview: Introducing network authentication

2
Comments
10 min read
O que é "vulnerabilidade de atribuição em massa"?

O que é "vulnerabilidade de atribuição em massa"?

6
Comments
2 min read
Exposing Databases to the Internet: Seriously?

Exposing Databases to the Internet: Seriously?

32
Comments 4
5 min read
Modelagem de Ameaças -Decompondo o Aplicativo

Modelagem de Ameaças -Decompondo o Aplicativo

2
Comments
7 min read
Setup External Secrets with Hashicorp Vault on AWS EKS

Setup External Secrets with Hashicorp Vault on AWS EKS

1
Comments
6 min read
Avoid a Malicious Attack MongoDB: How It Happened and What We Did About It.

Avoid a Malicious Attack MongoDB: How It Happened and What We Did About It.

7
Comments 6
2 min read
Mastering Cloud Computing: Your Step-by-Step Roadmap to Success

Mastering Cloud Computing: Your Step-by-Step Roadmap to Success

Comments 1
4 min read
Securing Your Website: Protecting Against Top Cyber Attacks

Securing Your Website: Protecting Against Top Cyber Attacks

Comments
3 min read
Don't let security slow you down, use it to go faster

Don't let security slow you down, use it to go faster

4
Comments
3 min read
Terminologias Utilizadas em Modelagem de Ameaças

Terminologias Utilizadas em Modelagem de Ameaças

2
Comments
4 min read
Create Robust Access Control in Your Flask Application using Flask-login & Permify

Create Robust Access Control in Your Flask Application using Flask-login & Permify

15
Comments 2
16 min read
Tools Used to Test and Detect Application Security Vulnerabilities

Tools Used to Test and Detect Application Security Vulnerabilities

20
Comments
6 min read
Spring Security and Non-flat Roles Inheritance Architecture

Spring Security and Non-flat Roles Inheritance Architecture

17
Comments 3
17 min read
How to Implement the Producer-Consumer Concurrency Design Pattern with asyncio Coroutines

How to Implement the Producer-Consumer Concurrency Design Pattern with asyncio Coroutines

1
Comments 1
6 min read
A Guide to Implementing Passwordless Login

A Guide to Implementing Passwordless Login

10
Comments 3
4 min read
What's Carrier Gateway is AWS?

What's Carrier Gateway is AWS?

3
Comments
2 min read
JWT's for authentication

JWT's for authentication

1
Comments
5 min read
Mastering GPG: The Essential Tool for Secure Communications in Software Development

Mastering GPG: The Essential Tool for Secure Communications in Software Development

2
Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
Modelagem de Ameaças - Introdução

Modelagem de Ameaças - Introdução

2
Comments
3 min read
Top 10 Practices for Secure Software Development

Top 10 Practices for Secure Software Development

1
Comments
9 min read
Using Google Tink to sign JWTs with ECDSA

Using Google Tink to sign JWTs with ECDSA

1
Comments
12 min read
SSL/TLS Configuration

SSL/TLS Configuration

2
Comments
3 min read
Protect your React Native application using Cloudflare Turnstile.

Protect your React Native application using Cloudflare Turnstile.

7
Comments
2 min read
Spring Security OAuth2 Client Credentials Grant

Spring Security OAuth2 Client Credentials Grant

13
Comments
5 min read
🔒Improve Bitwarden Enterprise management with Google SSO

🔒Improve Bitwarden Enterprise management with Google SSO

6
Comments
9 min read
Securizing your GitHub org

Securizing your GitHub org

19
Comments 1
6 min read
How to connect to a distant server using SSH

How to connect to a distant server using SSH

1
Comments
4 min read
Improving the Security of JSON Web Tokens (JWTs)

Improving the Security of JSON Web Tokens (JWTs)

4
Comments
3 min read
Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

3
Comments
7 min read
A lesser-known vector for XSS attacks: SVG files

A lesser-known vector for XSS attacks: SVG files

4
Comments
2 min read
Spring Security Persistent OAuth2 Client

Spring Security Persistent OAuth2 Client

5
Comments 2
6 min read
Improving security in HTTPS communication

Improving security in HTTPS communication

4
Comments
7 min read
Is your Cloud Native Application Secure?

Is your Cloud Native Application Secure?

9
Comments 4
4 min read
Implementing the right Email Verification flow

Implementing the right Email Verification flow

27
Comments 1
6 min read
Laravel Security

Laravel Security

Comments
3 min read
Cómo lograr un gobierno de múltiples cuentas a escala con AWS Control Tower - Parte 2

Cómo lograr un gobierno de múltiples cuentas a escala con AWS Control Tower - Parte 2

4
Comments
9 min read
Generate JWT Tokens in 3 Easy Steps in .Net

Generate JWT Tokens in 3 Easy Steps in .Net

6
Comments
4 min read
Desenvolvimento Seguro, S-SDLC

Desenvolvimento Seguro, S-SDLC

2
Comments
5 min read
OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

1
Comments
3 min read
Securing Your Web Applications with PHP OOP and PDO

Securing Your Web Applications with PHP OOP and PDO

1
Comments
9 min read
Customize the OAuth2 Authorization Consent Page

Customize the OAuth2 Authorization Consent Page

2
Comments
5 min read
The Data You‘ve Left Behind – an Attacker‘s Perspective

The Data You‘ve Left Behind – an Attacker‘s Perspective

1
Comments
7 min read
Expecto Strong Passwords: Enchant Your Online Security with a JavaScript Password Bookmarklet

Expecto Strong Passwords: Enchant Your Online Security with a JavaScript Password Bookmarklet

Comments
3 min read
Linux PAM Framework

Linux PAM Framework

7
Comments
5 min read
How Blockchain Security Works

How Blockchain Security Works

1
Comments 1
3 min read
Part 1. Access token vs ID token

Part 1. Access token vs ID token

4
Comments 1
3 min read
Integrating with Firebase and Pangea's security services

Integrating with Firebase and Pangea's security services

2
Comments
21 min read
Part 3. Token exchange from GCP to Azure

Part 3. Token exchange from GCP to Azure

6
Comments 1
4 min read
Using JWT with Spring Security OAuth2

Using JWT with Spring Security OAuth2

6
Comments
7 min read
Part 2. Token exchange from Azure to GCP

Part 2. Token exchange from Azure to GCP

8
Comments 1
6 min read
Embed security in your teams by appointing guardians

Embed security in your teams by appointing guardians

1
Comments
3 min read
loading...