DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Issue 34 of AWS Cloud Security Weekly

Issue 34 of AWS Cloud Security Weekly

Comments
2 min read
AWS VPC Endpoint is JUST a FinOps topic!?

AWS VPC Endpoint is JUST a FinOps topic!?

2
Comments
3 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
Top 10 Security Best Practices we learned the hard way

Top 10 Security Best Practices we learned the hard way

8
Comments 2
9 min read
Enhance Kubernetes Protection using SecurityContext Capabilities

Enhance Kubernetes Protection using SecurityContext Capabilities

Comments 1
3 min read
Exploring Port Scanning with the "net" Package in Go

Exploring Port Scanning with the "net" Package in Go

Comments
4 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
How to resolve vulnerabilities in Front-End Applications

How to resolve vulnerabilities in Front-End Applications

2
Comments
4 min read
Ionic + Capacitor Security Tips

Ionic + Capacitor Security Tips

2
Comments
3 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

1
Comments
7 min read
Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

25
Comments
3 min read
Dynamic AWS IAM Policies

Dynamic AWS IAM Policies

Comments
4 min read
Transfer contents and files using SCP from remote to local machine via bastion

Transfer contents and files using SCP from remote to local machine via bastion

3
Comments
2 min read
Proxy VS Reverse Proxy

Proxy VS Reverse Proxy

15
Comments 5
4 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

5
Comments
8 min read
Share Objects from Private S3 Buckets using CloudFront

Share Objects from Private S3 Buckets using CloudFront

Comments
11 min read
GitHub Security Best Practices Every Developer Should Know

GitHub Security Best Practices Every Developer Should Know

36
Comments 6
4 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

10
Comments 3
12 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Protegendo APIs da Esquerda para a Direita (e em td no meio do caminho) [Tradução +/- Comentada]

Protegendo APIs da Esquerda para a Direita (e em td no meio do caminho) [Tradução +/- Comentada]

6
Comments
18 min read
Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

18
Comments
8 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
Integrating Azure Secrets into your .NET Web Application

Integrating Azure Secrets into your .NET Web Application

Comments
3 min read
Securing Grafana for Web Access

Securing Grafana for Web Access

2
Comments
5 min read
OAuth2 explained: Bob's tale

OAuth2 explained: Bob's tale

1
Comments
2 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

5
Comments
4 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

2
Comments
4 min read
Patching your Auto Scaling Group on AWS

Patching your Auto Scaling Group on AWS

2
Comments
3 min read
PassKey in Go

PassKey in Go

4
Comments 1
9 min read
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

1
Comments
5 min read
#DevOps para noobs - Proxy Reverso

#DevOps para noobs - Proxy Reverso

192
Comments 12
3 min read
How to Secure Your AWS Account Using a Hardware security key [YubiKey]

How to Secure Your AWS Account Using a Hardware security key [YubiKey]

7
Comments
3 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
Whitehouse Declares Software Should Be Memory Safe

Whitehouse Declares Software Should Be Memory Safe

27
Comments 17
1 min read
Secure your API with these 16 Practices with Apache APISIX - part 1

Secure your API with these 16 Practices with Apache APISIX - part 1

15
Comments
7 min read
Banana Decryption: Unpacking Caesar Cipher with Power Automate

Banana Decryption: Unpacking Caesar Cipher with Power Automate

7
Comments
1 min read
Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

2
Comments
2 min read
Methodology: How we discovered over 18,000 API secret tokens

Methodology: How we discovered over 18,000 API secret tokens

Comments
6 min read
IAM Policy Conditions & SQS Queue Access

IAM Policy Conditions & SQS Queue Access

3
Comments
5 min read
Building near real-time automatic remediation for disabled S3 Block Public Access with serverless tools

Building near real-time automatic remediation for disabled S3 Block Public Access with serverless tools

2
Comments
7 min read
Docker Security Scanning in GitLab

Docker Security Scanning in GitLab

Comments
3 min read
Implementing App Security – Here’s How To Do It

Implementing App Security – Here’s How To Do It

2
Comments
4 min read
What is SAML And Why You Should Care

What is SAML And Why You Should Care

16
Comments
7 min read
Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

10
Comments
9 min read
Vulnerability Scanning Solution

Vulnerability Scanning Solution

Comments
3 min read
Linux Special Permissions: A Comprehensive Guide with Examples

Linux Special Permissions: A Comprehensive Guide with Examples

5
Comments
3 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Top Secrets Management Tools for 2024

Top Secrets Management Tools for 2024

4
Comments 1
10 min read
Essential Steps for Securing Your AWS Environment

Essential Steps for Securing Your AWS Environment

1
Comments 1
9 min read
Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

2
Comments
6 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

5
Comments
9 min read
Understand OAuth 2.0 code grant flow 🔐

Understand OAuth 2.0 code grant flow 🔐

12
Comments
5 min read
Deploy SPFx app using pipeline's Workload Identity federation

Deploy SPFx app using pipeline's Workload Identity federation

Comments
3 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
A Passwordless Future: Passkeys for Developers

A Passwordless Future: Passkeys for Developers

10
Comments
11 min read
Relationship Based Access Control (ReBAC): When To Use It

Relationship Based Access Control (ReBAC): When To Use It

7
Comments
8 min read
loading...