DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Build Networks with VLANs

Build Networks with VLANs

5
Comments
13 min read
A story about one DDOS attack and methods of protecting Juniper routing engine

A story about one DDOS attack and methods of protecting Juniper routing engine

4
Comments 1
22 min read
Avoiding Security Vulnerabilities: The tx.origin vs msg.sender Debate

Avoiding Security Vulnerabilities: The tx.origin vs msg.sender Debate

2
Comments 2
4 min read
Deploying a Service Securely on AWS - Part 1

Deploying a Service Securely on AWS - Part 1

1
Comments
7 min read
How to Set Up a Proxy Server in React | Dealing with CORS

How to Set Up a Proxy Server in React | Dealing with CORS

39
Comments 4
4 min read
SAST: how code analysis tools look for security flaws

SAST: how code analysis tools look for security flaws

2
Comments
14 min read
Your extraordinary one time secret

Your extraordinary one time secret

Comments
3 min read
Composable Apps security practices with Entando on Kubernetes, featuring Ippon expert

Composable Apps security practices with Entando on Kubernetes, featuring Ippon expert

3
Comments
2 min read
Deliver perfect HTTP security headers with AWS CloudFront

Deliver perfect HTTP security headers with AWS CloudFront

31
Comments
4 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

2
Comments
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

1
Comments
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

1
Comments
6 min read
Creating a secure API architecture in Rails with few example

Creating a secure API architecture in Rails with few example

15
Comments
7 min read
How to Deal with Compromised access in AWS

How to Deal with Compromised access in AWS

Comments
2 min read
Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

6
Comments
7 min read
Open Policy Agent with Kubernetes - Tutorial (Pt. 1)

Open Policy Agent with Kubernetes - Tutorial (Pt. 1)

Comments
7 min read
How I obtained my CISSP

How I obtained my CISSP

2
Comments
4 min read
What a security operations center analyst does and how to become one

What a security operations center analyst does and how to become one

1
Comments 1
4 min read
Whitelist IP addresses for Lambda function URLs

Whitelist IP addresses for Lambda function URLs

Comments
3 min read
Hacked Server

Hacked Server

3
Comments
3 min read
Deploying a Custom WAF v2 Rule with the AWS CDK

Deploying a Custom WAF v2 Rule with the AWS CDK

Comments
3 min read
You should use the OpenSSF Scorecard

You should use the OpenSSF Scorecard

5
Comments
3 min read
5 Creative Uses of Magic Links

5 Creative Uses of Magic Links

4
Comments
5 min read
Kube-bench and Popeye: A Power Duo for AKS Security Compliance

Kube-bench and Popeye: A Power Duo for AKS Security Compliance

2
Comments
29 min read
Streamlining incident response investigations with Steampipe relationship graphs

Streamlining incident response investigations with Steampipe relationship graphs

2
Comments
4 min read
Secret Management in Kubernetes: Approaches, Tools, and Best Practices

Secret Management in Kubernetes: Approaches, Tools, and Best Practices

1
Comments
9 min read
New Managed Policies for Amazon Detective

New Managed Policies for Amazon Detective

Comments
2 min read
3 Quick Tips for Input Validation

3 Quick Tips for Input Validation

5
Comments
3 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

37
Comments 7
6 min read
Create value before generating any revenue, it will save your life

Create value before generating any revenue, it will save your life

2
Comments 1
3 min read
REST API for Security Package

REST API for Security Package

1
Comments
6 min read
Last week top 5 posts tagged(#security)

Last week top 5 posts tagged(#security)

4
Comments 1
1 min read
sudoedit (`sudo -e`) security flaw (CVE-2023-22809)

sudoedit (`sudo -e`) security flaw (CVE-2023-22809)

4
Comments 7
1 min read
Protected Routes in React Router V6

Protected Routes in React Router V6

1
Comments 1
2 min read
Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022

Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022

2
Comments
8 min read
5 Application Security Tips for Developers

5 Application Security Tips for Developers

2
Comments
4 min read
How To Secure Your CI/CD Pipeline

How To Secure Your CI/CD Pipeline

1
Comments
5 min read
SlashID sign-in/sign-up React components

SlashID sign-in/sign-up React components

3
Comments
2 min read
How I secured sensitive information in GitLab environment variable and made pipeline secured

How I secured sensitive information in GitLab environment variable and made pipeline secured

3
Comments 1
4 min read
How to Implement OpenID on AWS

How to Implement OpenID on AWS

4
Comments
4 min read
Ultimate Roadmap To Ethical Hacking

Ultimate Roadmap To Ethical Hacking

5
Comments
3 min read
Token Gating Websites with Collab.Land

Token Gating Websites with Collab.Land

6
Comments
2 min read
sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)

sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)

2
Comments
1 min read
7 Tips for Low-Friction Authentication

7 Tips for Low-Friction Authentication

3
Comments
9 min read
Risk scoring your API Specification with Panoptica

Risk scoring your API Specification with Panoptica

4
Comments
6 min read
Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Comments
8 min read
Kubernetes Security Best Practices For Developers

Kubernetes Security Best Practices For Developers

13
Comments
6 min read
Quill CTF: 4. Safe NFT

Quill CTF: 4. Safe NFT

Comments
3 min read
QuillCTF: 5. D31eg4t3

QuillCTF: 5. D31eg4t3

Comments
3 min read
Default to Deny for More Secure Apps

Default to Deny for More Secure Apps

2
Comments
3 min read
GitOps and Kubernetes – Secure Handling of Secrets

GitOps and Kubernetes – Secure Handling of Secrets

2
Comments
5 min read
Fetching Google Groups with SlashID SSO

Fetching Google Groups with SlashID SSO

1
Comments
4 min read
Beginners’ Guide To Run A Linux Server Securely

Beginners’ Guide To Run A Linux Server Securely

16
Comments 2
5 min read
Better Performance and Security by Monitoring Logs, Metrics, and More

Better Performance and Security by Monitoring Logs, Metrics, and More

10
Comments 1
10 min read
Python Django: Create a more secure database by using a custom field

Python Django: Create a more secure database by using a custom field

3
Comments
2 min read
Managing CircleCI secrets via Terraform

Managing CircleCI secrets via Terraform

2
Comments
3 min read
What are AWS credentials?

What are AWS credentials?

6
Comments
5 min read
Access TiDB Cloud by Hashicorp Vault

Access TiDB Cloud by Hashicorp Vault

Comments
4 min read
The uncrackable back door : The intersection of mathematics, AI, politics and ethics

The uncrackable back door : The intersection of mathematics, AI, politics and ethics

2
Comments
8 min read
JS-X-Ray 6.0

JS-X-Ray 6.0

5
Comments 1
3 min read
loading...