DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

10
Comments 5
1 min read
🔐 Secure Web Application Flow with JWT: From Frontend to Backend

🔐 Secure Web Application Flow with JWT: From Frontend to Backend

Comments
2 min read
Managing Service Accounts in Multicluster Environments with RHACM

Managing Service Accounts in Multicluster Environments with RHACM

Comments
7 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
Using chroot to Restrict Linux Applications for Enhanced Security

Using chroot to Restrict Linux Applications for Enhanced Security

1
Comments
4 min read
How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

Comments
1 min read
AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

Comments
3 min read
Assessing Security Risks of Open Source Repos

Assessing Security Risks of Open Source Repos

Comments
2 min read
A Backend Engineer's Guide to Not Getting Hacked

A Backend Engineer's Guide to Not Getting Hacked

Comments
9 min read
🔐 Are Your Passwords Ready for the Quantum Age?

🔐 Are Your Passwords Ready for the Quantum Age?

1
Comments
2 min read
"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

Comments
1 min read
No More Sneaky Uploads : How I Made My Node.js App Virus-Free🛡️🦠

No More Sneaky Uploads : How I Made My Node.js App Virus-Free🛡️🦠

Comments
1 min read
Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Comments
9 min read
Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

11
Comments 1
2 min read
🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

Comments
2 min read
Level Up Your NGINX Skills with These 6 Configurations

Level Up Your NGINX Skills with These 6 Configurations

4
Comments
4 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

Security - Solving the "Content Security Policy (CSP) Header Not Set": style-src

Comments
3 min read
🔥 The Agent Registry Is a Trojan Horse

🔥 The Agent Registry Is a Trojan Horse

8
Comments 1
2 min read
Top IAM Challenges in Multi-Cloud Environments and How to Solve Them

Top IAM Challenges in Multi-Cloud Environments and How to Solve Them

Comments
3 min read
loading...