DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
HR Technology Trends in 2023: Digitalization with a Human Touch

HR Technology Trends in 2023: Digitalization with a Human Touch

13
Comments
11 min read
IAM Best Practices

IAM Best Practices

4
Comments
4 min read
Multiple authentication in Laravel 9

Multiple authentication in Laravel 9

2
Comments
3 min read
How to create a Password Generator using JavaScript

How to create a Password Generator using JavaScript

1
Comments
4 min read
Blackbox - Secrets amongst your code

Blackbox - Secrets amongst your code

1
Comments
2 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

1
Comments
4 min read
Any tutorial on how to encrypt devices?

Any tutorial on how to encrypt devices?

2
Comments 2
1 min read
Protect Your System from Install Scripts in npm packages

Protect Your System from Install Scripts in npm packages

2
Comments
2 min read
Cibersecurity, construindo um firewall humano.

Cibersecurity, construindo um firewall humano.

4
Comments 3
5 min read
You need to implement this email check

You need to implement this email check

1
Comments
3 min read
How to secure a web server (VPS)

How to secure a web server (VPS)

2
Comments
8 min read
Don't Skimp on Security: Add These Must-Have Features to Your Web Apps

Don't Skimp on Security: Add These Must-Have Features to Your Web Apps

4
Comments 2
9 min read
Preventing Installing Composer Dependencies with Known Security Vulnerabilities

Preventing Installing Composer Dependencies with Known Security Vulnerabilities

6
Comments
4 min read
AWS Create Bastion Host to communicate with your Private Subnet

AWS Create Bastion Host to communicate with your Private Subnet

1
Comments
4 min read
AWS Security Stories #04.3: OWASP - XSS

AWS Security Stories #04.3: OWASP - XSS

Comments
4 min read
What is the ideal session timeout?

What is the ideal session timeout?

1
Comments 1
1 min read
How To Manually Verify x509 Certificate Chains in .NET

How To Manually Verify x509 Certificate Chains in .NET

7
Comments 1
7 min read
AWS Security Stories #04.2: OWASP - SSRF

AWS Security Stories #04.2: OWASP - SSRF

3
Comments
4 min read
AWS Security Stories #04.1: OWASP - CSRF

AWS Security Stories #04.1: OWASP - CSRF

8
Comments
4 min read
What to Expect in Web Development and JavaScript during 2023 - Trends and Technologies

What to Expect in Web Development and JavaScript during 2023 - Trends and Technologies

9
Comments 1
14 min read
Assign a free SSL certificate to an nginx server with certbot

Assign a free SSL certificate to an nginx server with certbot

1
Comments
1 min read
Enabling logs and alerting in AWS EKS cluster - CloudWatch Log Insights and Metric filters

Enabling logs and alerting in AWS EKS cluster - CloudWatch Log Insights and Metric filters

4
Comments
6 min read
Enable RenovateBot for Azure Pipelines

Enable RenovateBot for Azure Pipelines

1
Comments
3 min read
Why Do We Need Authorization and Authentication? 🔑

Why Do We Need Authorization and Authentication? 🔑

285
Comments 19
8 min read
3 reasons why any website's security is important

3 reasons why any website's security is important

4
Comments
4 min read
Your AWS EC2 Has Been Hacked. What Will Happen Now?

Your AWS EC2 Has Been Hacked. What Will Happen Now?

7
Comments
5 min read
Simple XSS Prevention Method in Javascript

Simple XSS Prevention Method in Javascript

4
Comments
3 min read
Privacy-Preserving Machine Learning with AIJack - 3: Federated Learning with Paillier Encryption on PyTorch

Privacy-Preserving Machine Learning with AIJack - 3: Federated Learning with Paillier Encryption on PyTorch

Comments
3 min read
The true impact of technical debt

The true impact of technical debt

2
Comments
6 min read
Tips for Passing AWS Certification Exams Like a Boss

Tips for Passing AWS Certification Exams Like a Boss

Comments
13 min read
AI generated code creates a new security attack vector

AI generated code creates a new security attack vector

12
Comments 17
1 min read
Ultimate Review of GitHub-related "fackups" in 2022

Ultimate Review of GitHub-related "fackups" in 2022

3
Comments
11 min read
Rust's impact on security (Why the NSA, Microsoft CTO, and Linux recommend it as the safer choice over C and C++)

Rust's impact on security (Why the NSA, Microsoft CTO, and Linux recommend it as the safer choice over C and C++)

7
Comments 3
9 min read
CORS for babies 👶

CORS for babies 👶

4
Comments 1
1 min read
Verifying requests from Slack - The CORRECT method for Node.js

Verifying requests from Slack - The CORRECT method for Node.js

3
Comments
5 min read
Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Comments
2 min read
How to choose an Authorization Service?

How to choose an Authorization Service?

4
Comments
5 min read
Analisando projetos Flutter/Dart com Veracode

Analisando projetos Flutter/Dart com Veracode

3
Comments
5 min read
Validação de PR no Azure DevOps

Validação de PR no Azure DevOps

1
Comments
2 min read
Importação de falhas para o Azure Boards

Importação de falhas para o Azure Boards

1
Comments
3 min read
O que é SCA?

O que é SCA?

2
Comments
3 min read
The Everything Guide to Data Collection in DevSecOps

The Everything Guide to Data Collection in DevSecOps

1
Comments
8 min read
How to Prevent Bots From Submitting Forms

How to Prevent Bots From Submitting Forms

17
Comments 9
2 min read
Privacy-Preserving Machine Learning with AIJack - 2: Model Inversion Attack against Federated Learning on PyTorch

Privacy-Preserving Machine Learning with AIJack - 2: Model Inversion Attack against Federated Learning on PyTorch

2
Comments
4 min read
Pipeline Scan

Pipeline Scan

3
Comments
2 min read
AWS Security Hub Guidebook - Unwinding security concerns

AWS Security Hub Guidebook - Unwinding security concerns

4
Comments
5 min read
Secretlint 6: masking API tokens in .bash_history and .zsh_history

Secretlint 6: masking API tokens in .bash_history and .zsh_history

1
Comments
4 min read
OpenBSD フルディスク暗号化 (on VirtualBox)

OpenBSD フルディスク暗号化 (on VirtualBox)

1
Comments
2 min read
Cybersecurity 101 - Part 1

Cybersecurity 101 - Part 1

3
Comments
4 min read
how to install assetfinder tool on any linunx distro 🐧

how to install assetfinder tool on any linunx distro 🐧

3
Comments
1 min read
Passwords in SQL-Server C#

Passwords in SQL-Server C#

6
Comments
3 min read
Top 5 Featured DEV Tag(#security) Posts from the year 2022

Top 5 Featured DEV Tag(#security) Posts from the year 2022

8
Comments 2
2 min read
Introducing Secweb security headers for fastapi and starlette framework

Introducing Secweb security headers for fastapi and starlette framework

4
Comments
2 min read
BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

BEST CYBER SECURITY PROGRAMS FOR BEGINNERS

6
Comments
3 min read
Software Supply Chain Security Leadership Series: Measuring SBOM Quality

Software Supply Chain Security Leadership Series: Measuring SBOM Quality

3
Comments
1 min read
Blockchain: from A to Z in 10 minutes for future Smart Contract Engineers

Blockchain: from A to Z in 10 minutes for future Smart Contract Engineers

9
Comments 4
13 min read
What is a cookie, and what are they used for?

What is a cookie, and what are they used for?

55
Comments 19
3 min read
Complete Guide on OAuth 2.0 Reference tokens in Asp.Net Core 7 Using Openiddict

Complete Guide on OAuth 2.0 Reference tokens in Asp.Net Core 7 Using Openiddict

12
Comments 1
7 min read
Running graphic apps in Docker: AWS WorkSpaces

Running graphic apps in Docker: AWS WorkSpaces

7
Comments
3 min read
Weird Phishing attempt on GitHub

Weird Phishing attempt on GitHub

2
Comments 2
2 min read
loading...