DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your Website: Protecting Against Top Cyber Attacks

Securing Your Website: Protecting Against Top Cyber Attacks

Comments
3 min read
Don't let security slow you down, use it to go faster

Don't let security slow you down, use it to go faster

4
Comments
3 min read
Terminologias Utilizadas em Modelagem de Ameaças

Terminologias Utilizadas em Modelagem de Ameaças

2
Comments
4 min read
Create Robust Access Control in Your Flask Application using Flask-login & Permify

Create Robust Access Control in Your Flask Application using Flask-login & Permify

15
Comments 2
16 min read
Tools Used to Test and Detect Application Security Vulnerabilities

Tools Used to Test and Detect Application Security Vulnerabilities

20
Comments
6 min read
Spring Security and Non-flat Roles Inheritance Architecture

Spring Security and Non-flat Roles Inheritance Architecture

18
Comments 3
17 min read
How to Implement the Producer-Consumer Concurrency Design Pattern with asyncio Coroutines

How to Implement the Producer-Consumer Concurrency Design Pattern with asyncio Coroutines

1
Comments 1
6 min read
A Guide to Implementing Passwordless Login

A Guide to Implementing Passwordless Login

10
Comments 3
4 min read
What's Carrier Gateway is AWS?

What's Carrier Gateway is AWS?

3
Comments
2 min read
JWT's for authentication

JWT's for authentication

1
Comments
5 min read
Mastering GPG: The Essential Tool for Secure Communications in Software Development

Mastering GPG: The Essential Tool for Secure Communications in Software Development

2
Comments
4 min read
How To Safely Verify MACs With Go And PHP Examples

How To Safely Verify MACs With Go And PHP Examples

Comments 1
5 min read
Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

Explicando o TOP 4 da OWASP "Design Inseguro" para desenvolvedores

10
Comments
3 min read
GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

GRC in Cyber Security: 5 Reasons to Consolidate Cyber Security, Governance, Risk, Compliance, and Insurance

1
Comments
4 min read
Modelagem de Ameaças - Introdução

Modelagem de Ameaças - Introdução

2
Comments
3 min read
Top 10 Practices for Secure Software Development

Top 10 Practices for Secure Software Development

1
Comments
9 min read
Using Google Tink to sign JWTs with ECDSA

Using Google Tink to sign JWTs with ECDSA

1
Comments
12 min read
SSL/TLS Configuration

SSL/TLS Configuration

2
Comments
3 min read
Protect your React Native application using Cloudflare Turnstile.

Protect your React Native application using Cloudflare Turnstile.

13
Comments
2 min read
Spring Security OAuth2 Client Credentials Grant

Spring Security OAuth2 Client Credentials Grant

17
Comments
5 min read
🔒Improve Bitwarden Enterprise management with Google SSO

🔒Improve Bitwarden Enterprise management with Google SSO

6
Comments
9 min read
Securizing your GitHub org

Securizing your GitHub org

19
Comments 1
6 min read
How to connect to a distant server using SSH

How to connect to a distant server using SSH

1
Comments
4 min read
Improving the Security of JSON Web Tokens (JWTs)

Improving the Security of JSON Web Tokens (JWTs)

4
Comments
3 min read
Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

Using AWS CLI with Powershell's SecretStore Module to protect your Access keys

3
Comments
7 min read
A lesser-known vector for XSS attacks: SVG files

A lesser-known vector for XSS attacks: SVG files

4
Comments
2 min read
Spring Security Persistent OAuth2 Client

Spring Security Persistent OAuth2 Client

5
Comments 2
6 min read
Improving security in HTTPS communication

Improving security in HTTPS communication

4
Comments
7 min read
Is your Cloud Native Application Secure?

Is your Cloud Native Application Secure?

9
Comments 4
4 min read
Implementing the right Email Verification flow

Implementing the right Email Verification flow

29
Comments 1
6 min read
Laravel Security

Laravel Security

Comments
3 min read
Cómo lograr un gobierno de múltiples cuentas a escala con AWS Control Tower - Parte 2

Cómo lograr un gobierno de múltiples cuentas a escala con AWS Control Tower - Parte 2

4
Comments
9 min read
Generate JWT Tokens in 3 Easy Steps in .Net

Generate JWT Tokens in 3 Easy Steps in .Net

6
Comments
4 min read
Desenvolvimento Seguro, S-SDLC

Desenvolvimento Seguro, S-SDLC

2
Comments
5 min read
OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

OpenSSH 9.2: stricter default sandbox policy in OpenSSH client on OpenBSD

1
Comments
3 min read
Securing Your Web Applications with PHP OOP and PDO

Securing Your Web Applications with PHP OOP and PDO

2
Comments
9 min read
Customize the OAuth2 Authorization Consent Page

Customize the OAuth2 Authorization Consent Page

2
Comments
5 min read
The Data You‘ve Left Behind – an Attacker‘s Perspective

The Data You‘ve Left Behind – an Attacker‘s Perspective

1
Comments
7 min read
Expecto Strong Passwords: Enchant Your Online Security with a JavaScript Password Bookmarklet

Expecto Strong Passwords: Enchant Your Online Security with a JavaScript Password Bookmarklet

Comments
3 min read
Linux PAM Framework

Linux PAM Framework

7
Comments
5 min read
Setup External Secrets with Hashicorp Vault on AWS EKS

Setup External Secrets with Hashicorp Vault on AWS EKS

2
Comments
6 min read
How Blockchain Security Works

How Blockchain Security Works

1
Comments 1
3 min read
Part 1. Access token vs ID token

Part 1. Access token vs ID token

4
Comments 1
3 min read
Integrating with Firebase and Pangea's security services

Integrating with Firebase and Pangea's security services

2
Comments
21 min read
Part 3. Token exchange from GCP to Azure

Part 3. Token exchange from GCP to Azure

6
Comments 1
4 min read
Using JWT with Spring Security OAuth2

Using JWT with Spring Security OAuth2

7
Comments
7 min read
Part 2. Token exchange from Azure to GCP

Part 2. Token exchange from Azure to GCP

8
Comments 1
6 min read
Embed security in your teams by appointing guardians

Embed security in your teams by appointing guardians

1
Comments
3 min read
QuillCTF: 6. Collatz Puzzle

QuillCTF: 6. Collatz Puzzle

4
Comments
4 min read
♾️ Efficient stack management with eol on GitHub 🧑‍🤝‍🧑

♾️ Efficient stack management with eol on GitHub 🧑‍🤝‍🧑

Comments 3
1 min read
Automating the deletion of specific inbound rules from any security groups in AWS via Config

Automating the deletion of specific inbound rules from any security groups in AWS via Config

9
Comments
5 min read
I've created a full-stack user permission model, should I go open-source?

I've created a full-stack user permission model, should I go open-source?

3
Comments
4 min read
Concurrency and Parallelism: An Overview

Concurrency and Parallelism: An Overview

7
Comments
4 min read
Authenticate using Auth0

Authenticate using Auth0

5
Comments
1 min read
Secure Your Webserver with Nginx

Secure Your Webserver with Nginx

3
Comments
4 min read
10 Best Practices to keep your API secure

10 Best Practices to keep your API secure

4
Comments 1
2 min read
Check Website Headers

Check Website Headers

1
Comments 1
1 min read
What's insecure, buggy, and poorly designed in the following wordpress code?

What's insecure, buggy, and poorly designed in the following wordpress code?

Comments
1 min read
CVE-2023-22501 - Broken Authentication vulnerability in Jira Service Management

CVE-2023-22501 - Broken Authentication vulnerability in Jira Service Management

1
Comments
2 min read
Terraform Credentials Setup in GCP

Terraform Credentials Setup in GCP

1
Comments
2 min read
loading...