DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Got a false positive! AWS WAF HostingProviderIPList may block system linking.

Got a false positive! AWS WAF HostingProviderIPList may block system linking.

Comments
2 min read
Did you know you could use OpenAPI for security?

Did you know you could use OpenAPI for security?

12
Comments
3 min read
Logging in, a thing we all hate

Logging in, a thing we all hate

25
Comments 3
11 min read
Protect Directories Using APACHE

Protect Directories Using APACHE

1
Comments
2 min read
Use Terraform to update kubeconfig

Use Terraform to update kubeconfig

1
Comments
1 min read
XSS: Problem with allowing users to upload SVG

XSS: Problem with allowing users to upload SVG

3
Comments
2 min read
Dynamically handling origins in HTTP APIs

Dynamically handling origins in HTTP APIs

1
Comments
6 min read
Connect to an OpenVPN server running on Synology DSM 7

Connect to an OpenVPN server running on Synology DSM 7

4
Comments 2
8 min read
Redirect to a custom login page when securing your Angular app with MSAL

Redirect to a custom login page when securing your Angular app with MSAL

2
Comments
6 min read
Pritunl: running VPN in Kubernetes

Pritunl: running VPN in Kubernetes

1
Comments
6 min read
Watch out what you expose with Angular Interceptors

Watch out what you expose with Angular Interceptors

13
Comments 1
5 min read
Fixing potential security issues in your Infrastructure as Code at the source with Sysdig

Fixing potential security issues in your Infrastructure as Code at the source with Sysdig

1
Comments
7 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability

Top 5 Tools and Practical Steps in Checking Website Vulnerability

7
Comments
5 min read
Top 7 Authentication Providers for Building Apps With JWT (2022)

Top 7 Authentication Providers for Building Apps With JWT (2022)

4
Comments
9 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 1)

Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 1)

1
Comments
5 min read
AWS GuardDuty In A Nutshell 🌰

AWS GuardDuty In A Nutshell 🌰

2
Comments
3 min read
Generating secrets in Clojure

Generating secrets in Clojure

3
Comments
2 min read
Installing Snort on Kali Linux

Installing Snort on Kali Linux

22
Comments 8
2 min read
Why should I care about SBOMs as a Software Developer ...

Why should I care about SBOMs as a Software Developer ...

7
Comments 3
1 min read
Installing Nessus Agents on AWS EC2

Installing Nessus Agents on AWS EC2

1
Comments
4 min read
Writing Secure Puppet Code: part one

Writing Secure Puppet Code: part one

4
Comments
8 min read
Understanding identity in .NET

Understanding identity in .NET

43
Comments
5 min read
How to create SBOMs for free

How to create SBOMs for free

4
Comments
3 min read
"Deleting" doesn't really "delete"

"Deleting" doesn't really "delete"

5
Comments
5 min read
SBOM/Vulnerability Assessments against Docker Images.

SBOM/Vulnerability Assessments against Docker Images.

1
Comments
1 min read
AWS Solutions Architect Associate Exam Preparation Guide

AWS Solutions Architect Associate Exam Preparation Guide

7
Comments 2
3 min read
JWT y Golang

JWT y Golang

17
Comments
4 min read
3 ways to improve your OSS project's resilience for Hacktoberfest

3 ways to improve your OSS project's resilience for Hacktoberfest

8
Comments
4 min read
Kubernetes Security: 10 Best Practices from the Industry and Community

Kubernetes Security: 10 Best Practices from the Industry and Community

62
Comments
6 min read
Teleport Database Access Management.

Teleport Database Access Management.

3
Comments
4 min read
PGP - Create a Public/Private Key Pair(Part 2)

PGP - Create a Public/Private Key Pair(Part 2)

2
Comments
2 min read
Fixing up CORS errors in HTTP API

Fixing up CORS errors in HTTP API

9
Comments 1
4 min read
7 Facts on securing your WSO2 Micro integrator

7 Facts on securing your WSO2 Micro integrator

1
Comments
8 min read
Implement DevSecOps to Secure your CI/CD pipeline

Implement DevSecOps to Secure your CI/CD pipeline

8
Comments
25 min read
Spring security new Authorization server (0.3.1) - part 3

Spring security new Authorization server (0.3.1) - part 3

2
Comments 1
4 min read
How To: generate CSR, Self-signed and CA certificat

How To: generate CSR, Self-signed and CA certificat

5
Comments
2 min read
FREE VPN with AWS

FREE VPN with AWS

17
Comments 1
5 min read
Some notes about Bottlerocket Security

Some notes about Bottlerocket Security

5
Comments 1
3 min read
26 best practices to secure your cloud environment☁️🔥

26 best practices to secure your cloud environment☁️🔥

48
Comments 3
15 min read
How to hide a secret message in image?

How to hide a secret message in image?

6
Comments
1 min read
Spring security new Authorization server (0.3.1) - part 2

Spring security new Authorization server (0.3.1) - part 2

4
Comments
3 min read
SSH Key-based Authentication

SSH Key-based Authentication

6
Comments
5 min read
Spring security new Authorization server (0.3.1) - part 1

Spring security new Authorization server (0.3.1) - part 1

5
Comments 2
5 min read
Debunking myths about HTTPS

Debunking myths about HTTPS

131
Comments 10
4 min read
Customising AWS Control Tower with CfCT

Customising AWS Control Tower with CfCT

2
Comments
9 min read
Getting Started with Notary

Getting Started with Notary

23
Comments 1
3 min read
How to Terraform multiple security group with varying configuration

How to Terraform multiple security group with varying configuration

5
Comments 2
3 min read
We built the first always (!) encrypted K8s 🔐

We built the first always (!) encrypted K8s 🔐

18
Comments
3 min read
What's The Name of This Password Management Technique and is it a Good Idea?

What's The Name of This Password Management Technique and is it a Good Idea?

18
Comments 12
2 min read
Password Security:Dynamic Salt

Password Security:Dynamic Salt

8
Comments
1 min read
Using Cognito groups to control access to API endpoints

Using Cognito groups to control access to API endpoints

10
Comments 4
8 min read
Container Images for the Cloud Native Era

Container Images for the Cloud Native Era

10
Comments 3
4 min read
HTML5 required and pattern are not a security feature

HTML5 required and pattern are not a security feature

6
Comments
1 min read
Architecting a Keycloak Deployment in AWS

Architecting a Keycloak Deployment in AWS

2
Comments
3 min read
Cherrybomb for OWASP Conference 😁 🥳

Cherrybomb for OWASP Conference 😁 🥳

15
Comments
1 min read
What can be done with an IP address?

What can be done with an IP address?

5
Comments 2
4 min read
How !(not) to store passwords

How !(not) to store passwords

2
Comments
15 min read
OWASP | Web Application Penetration Testing

OWASP | Web Application Penetration Testing

2
Comments 1
7 min read
26 AWS Security Best Practices to Adopt in Production

26 AWS Security Best Practices to Adopt in Production

8
Comments
33 min read
How Does WebAuthn Work?

How Does WebAuthn Work?

7
Comments 2
5 min read
loading...