DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Generate RSA Key Using JavaScript and Python

How to Generate RSA Key Using JavaScript and Python

Comments
4 min read
Guardians of the Records: Casting Spells for Secure Sharing in Dataverse

Guardians of the Records: Casting Spells for Secure Sharing in Dataverse

11
Comments
3 min read
Security news weekly round-up - 11th October 2024

Security news weekly round-up - 11th October 2024

1
Comments
3 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

Comments
2 min read
Top 10 Tips with Code Examples: C# Application Security

Top 10 Tips with Code Examples: C# Application Security

13
Comments 1
8 min read
Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Comments
5 min read
5 AI-Powered Content Detectors to Help Identify AI-Generated Text

5 AI-Powered Content Detectors to Help Identify AI-Generated Text

1
Comments
5 min read
Cybersecurity – Protecting Your Business in the Digital Age

Cybersecurity – Protecting Your Business in the Digital Age

Comments
4 min read
What happens when a user tries to access a resource in AWS ?

What happens when a user tries to access a resource in AWS ?

Comments
1 min read
Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

1
Comments
7 min read
API7 Enterprise v3.2.16: Integrated Secret Providers

API7 Enterprise v3.2.16: Integrated Secret Providers

1
Comments
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

2
Comments 1
5 min read
Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Comments
4 min read
BotKube: Integrando o agente de monitoramento com o Slack

BotKube: Integrando o agente de monitoramento com o Slack

4
Comments
2 min read
Dockerfile Best Practices: Writing Efficient and Secure Docker Images

Dockerfile Best Practices: Writing Efficient and Secure Docker Images

47
Comments 4
4 min read
Create a self-signed certificate with your own root CA

Create a self-signed certificate with your own root CA

1
Comments
2 min read
The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

Comments
8 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

1
Comments 2
10 min read
Introduction to Minder

Introduction to Minder

2
Comments
2 min read
E-commerce website vulnerability bounty practice sharing(I)

E-commerce website vulnerability bounty practice sharing(I)

Comments
2 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
Identity and Access Management (IAM) on AWS

Identity and Access Management (IAM) on AWS

Comments
3 min read
Building a Simple Python-Based Firewall for Home Networks

Building a Simple Python-Based Firewall for Home Networks

9
Comments
2 min read
Top 11 CI/CD Tools for 2024

Top 11 CI/CD Tools for 2024

10
Comments
7 min read
Guia super Resumido do PCI-DSS

Guia super Resumido do PCI-DSS

1
Comments
6 min read
Wednesday Links - Edition 2024-09-04

Wednesday Links - Edition 2024-09-04

Comments
1 min read
How will NIS2 affect European Industries

How will NIS2 affect European Industries

Comments
8 min read
Código seguro com OWASP e SSDLC - 3 OWASP API Security Top 10

Código seguro com OWASP e SSDLC - 3 OWASP API Security Top 10

1
Comments
6 min read
Open Source Tool List for Web App Security

Open Source Tool List for Web App Security

1
Comments
4 min read
🔐 Unlocking the Secrets of Data Security: Cryptography, Encryption, and Hashing Made Simple 🛡️

🔐 Unlocking the Secrets of Data Security: Cryptography, Encryption, and Hashing Made Simple 🛡️

Comments
3 min read
Issue 60 of AWS Cloud Security Weekly

Issue 60 of AWS Cloud Security Weekly

Comments
2 min read
The Most Important Setting in Your Power Platform

The Most Important Setting in Your Power Platform

20
Comments 2
3 min read
Analyzing Preview Bot Behaviour

Analyzing Preview Bot Behaviour

Comments
3 min read
🔒 Why You Should Rethink Using .env Files in Your Projects 🚫

🔒 Why You Should Rethink Using .env Files in Your Projects 🚫

Comments
2 min read
Prevention: It's Time to Save Those Millions

Prevention: It's Time to Save Those Millions

1
Comments
2 min read
Hot Takes and Cool Strategies: BSides Las Vegas 2024

Hot Takes and Cool Strategies: BSides Las Vegas 2024

Comments
6 min read
Build An Advanced Password Cracker With Python (Complete Guide)

Build An Advanced Password Cracker With Python (Complete Guide)

6
Comments
8 min read
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.

Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.

Comments 1
9 min read
Secure Data Stack: Navigating Adoption Challenges of Data Encryption

Secure Data Stack: Navigating Adoption Challenges of Data Encryption

1
Comments
5 min read
Boost Your Git Workflow: Adding SSH Keys for Secure Repository Access

Boost Your Git Workflow: Adding SSH Keys for Secure Repository Access

Comments
3 min read
Cómo Compartir un Secreto: Desglosando el Método de Adi Shamir para la Seguridad de Datos

Cómo Compartir un Secreto: Desglosando el Método de Adi Shamir para la Seguridad de Datos

Comments
4 min read
Defense in Depth approach using AWS

Defense in Depth approach using AWS

5
Comments 2
12 min read
Node.js to support ESM Require: What this means for NestJS developers and other CommonJS frameworks

Node.js to support ESM Require: What this means for NestJS developers and other CommonJS frameworks

5
Comments
8 min read
Enhancing Frontend Security: Protecting Your Applications from Modern Threats

Enhancing Frontend Security: Protecting Your Applications from Modern Threats

Comments
2 min read
Passwords: Are they going extinct?

Passwords: Are they going extinct?

6
Comments
6 min read
The Day a DDOS Attack Led to the Most Awkward Hello World

The Day a DDOS Attack Led to the Most Awkward Hello World

15
Comments
2 min read
Issue 63 of AWS Cloud Security Weekly

Issue 63 of AWS Cloud Security Weekly

5
Comments
3 min read
More Secure JWT | A Better Experience

More Secure JWT | A Better Experience

7
Comments
6 min read
Secure AWS API Gateway with IAM

Secure AWS API Gateway with IAM

1
Comments
3 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

13
Comments
4 min read
Stereotype of a Nigeria Hacker

Stereotype of a Nigeria Hacker

5
Comments
2 min read
Introduction to System Design: A Beginner-Friendly Guide

Introduction to System Design: A Beginner-Friendly Guide

5
Comments
6 min read
Security news weekly round-up - 4th October 2024

Security news weekly round-up - 4th October 2024

1
Comments
3 min read
Project Overview: AWS Inspector in Jenkins Pipeline

Project Overview: AWS Inspector in Jenkins Pipeline

15
Comments
3 min read
Build Your First Port Scanner using Python in 2024

Build Your First Port Scanner using Python in 2024

11
Comments 2
5 min read
How to Use Secrets in GitHub Actions Workflows

How to Use Secrets in GitHub Actions Workflows

13
Comments 1
4 min read
Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

Blue Team Con 2024: Sharing Security Insights and Defense Strategies in Chicago

1
Comments
6 min read
Cybersecurity Erosion: Addressing the Hidden Threat to Long-Term Security

Cybersecurity Erosion: Addressing the Hidden Threat to Long-Term Security

1
Comments 1
4 min read
Cybersecurity Awareness Month: Stay Safe Online

Cybersecurity Awareness Month: Stay Safe Online

1
Comments
3 min read
loading...