DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Composable Apps security practices with Entando on Kubernetes, featuring Ippon expert

Composable Apps security practices with Entando on Kubernetes, featuring Ippon expert

3
Comments
2 min read
Deliver perfect HTTP security headers with AWS CloudFront

Deliver perfect HTTP security headers with AWS CloudFront

31
Comments
4 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

2
Comments
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

1
Comments
6 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

1
Comments
5 min read
Creating a secure API architecture in Rails with few example

Creating a secure API architecture in Rails with few example

15
Comments
7 min read
How to Deal with Compromised access in AWS

How to Deal with Compromised access in AWS

Comments
2 min read
Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

Explicando o TOP 1 da OWASP "Broken Access Control" para desenvolvedores

6
Comments
7 min read
How I obtained my CISSP

How I obtained my CISSP

2
Comments
4 min read
Open Policy Agent with Kubernetes - Tutorial (Pt. 1)

Open Policy Agent with Kubernetes - Tutorial (Pt. 1)

Comments
7 min read
What a security operations center analyst does and how to become one

What a security operations center analyst does and how to become one

1
Comments 1
4 min read
Whitelist IP addresses for Lambda function URLs

Whitelist IP addresses for Lambda function URLs

Comments
3 min read
Hacked Server

Hacked Server

3
Comments
3 min read
Deploying a Custom WAF v2 Rule with the AWS CDK

Deploying a Custom WAF v2 Rule with the AWS CDK

Comments
3 min read
You should use the OpenSSF Scorecard

You should use the OpenSSF Scorecard

5
Comments
3 min read
5 Creative Uses of Magic Links

5 Creative Uses of Magic Links

4
Comments
5 min read
Kube-bench and Popeye: A Power Duo for AKS Security Compliance

Kube-bench and Popeye: A Power Duo for AKS Security Compliance

2
Comments
29 min read
Streamlining incident response investigations with Steampipe relationship graphs

Streamlining incident response investigations with Steampipe relationship graphs

2
Comments
4 min read
New Managed Policies for Amazon Detective

New Managed Policies for Amazon Detective

Comments
2 min read
Secret Management in Kubernetes: Approaches, Tools, and Best Practices

Secret Management in Kubernetes: Approaches, Tools, and Best Practices

1
Comments
9 min read
3 Quick Tips for Input Validation

3 Quick Tips for Input Validation

5
Comments
3 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

39
Comments 7
6 min read
Create value before generating any revenue, it will save your life

Create value before generating any revenue, it will save your life

2
Comments 1
3 min read
REST API for Security Package

REST API for Security Package

1
Comments
6 min read
Last week top 5 posts tagged(#security)

Last week top 5 posts tagged(#security)

4
Comments 1
1 min read
sudoedit (`sudo -e`) security flaw (CVE-2023-22809)

sudoedit (`sudo -e`) security flaw (CVE-2023-22809)

4
Comments 7
1 min read
Protected Routes in React Router V6

Protected Routes in React Router V6

1
Comments 1
2 min read
Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022

Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022

2
Comments
8 min read
5 Application Security Tips for Developers

5 Application Security Tips for Developers

2
Comments
4 min read
How To Secure Your CI/CD Pipeline

How To Secure Your CI/CD Pipeline

1
Comments
5 min read
SlashID sign-in/sign-up React components

SlashID sign-in/sign-up React components

3
Comments
2 min read
How I secured sensitive information in GitLab environment variable and made pipeline secured

How I secured sensitive information in GitLab environment variable and made pipeline secured

3
Comments 1
4 min read
How to Implement OpenID on AWS

How to Implement OpenID on AWS

4
Comments
4 min read
Ultimate Roadmap To Ethical Hacking

Ultimate Roadmap To Ethical Hacking

5
Comments
3 min read
Token Gating Websites with Collab.Land

Token Gating Websites with Collab.Land

6
Comments
2 min read
sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)

sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)

2
Comments
1 min read
7 Tips for Low-Friction Authentication

7 Tips for Low-Friction Authentication

3
Comments
9 min read
Risk scoring your API Specification with Panoptica

Risk scoring your API Specification with Panoptica

4
Comments
6 min read
Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Comments
8 min read
Kubernetes Security Best Practices For Developers

Kubernetes Security Best Practices For Developers

13
Comments
6 min read
Quill CTF: 4. Safe NFT

Quill CTF: 4. Safe NFT

Comments
3 min read
QuillCTF: 5. D31eg4t3

QuillCTF: 5. D31eg4t3

Comments
3 min read
Default to Deny for More Secure Apps

Default to Deny for More Secure Apps

2
Comments
3 min read
GitOps and Kubernetes – Secure Handling of Secrets

GitOps and Kubernetes – Secure Handling of Secrets

2
Comments
5 min read
Fetching Google Groups with SlashID SSO

Fetching Google Groups with SlashID SSO

1
Comments
4 min read
Beginners’ Guide To Run A Linux Server Securely

Beginners’ Guide To Run A Linux Server Securely

16
Comments 2
5 min read
Better Performance and Security by Monitoring Logs, Metrics, and More

Better Performance and Security by Monitoring Logs, Metrics, and More

10
Comments 1
10 min read
Python Django: Create a more secure database by using a custom field

Python Django: Create a more secure database by using a custom field

3
Comments
2 min read
What are AWS credentials?

What are AWS credentials?

6
Comments
5 min read
Managing CircleCI secrets via Terraform

Managing CircleCI secrets via Terraform

2
Comments
3 min read
Access TiDB Cloud by Hashicorp Vault

Access TiDB Cloud by Hashicorp Vault

Comments
4 min read
The uncrackable back door : The intersection of mathematics, AI, politics and ethics

The uncrackable back door : The intersection of mathematics, AI, politics and ethics

2
Comments
8 min read
JS-X-Ray 6.0

JS-X-Ray 6.0

5
Comments 1
3 min read
HR Technology Trends in 2023: Digitalization with a Human Touch

HR Technology Trends in 2023: Digitalization with a Human Touch

13
Comments
11 min read
IAM Best Practices

IAM Best Practices

4
Comments
4 min read
Multiple authentication in Laravel 9

Multiple authentication in Laravel 9

2
Comments
3 min read
How to create a Password Generator using JavaScript

How to create a Password Generator using JavaScript

1
Comments
4 min read
Blackbox - Secrets amongst your code

Blackbox - Secrets amongst your code

1
Comments
2 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

1
Comments
4 min read
Any tutorial on how to encrypt devices?

Any tutorial on how to encrypt devices?

2
Comments 2
1 min read
loading...