DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Using Git with two or more users

Using Git with two or more users

47
Comments 10
2 min read
Low-cost best practices in AWS

Low-cost best practices in AWS

28
Comments 4
9 min read
Reference Architecture for Network Secured Azure Web App

Reference Architecture for Network Secured Azure Web App

3
Comments
6 min read
How do you safely share passwords?

How do you safely share passwords?

9
Comments 16
1 min read
Cross-site Scripting (XSS) and ways to prevent it in PHP applications

Cross-site Scripting (XSS) and ways to prevent it in PHP applications

36
Comments 10
2 min read
7 Essential Security Terms - Part 1

7 Essential Security Terms - Part 1

9
Comments
2 min read
7 tips for beginners to secure website or web applications

7 tips for beginners to secure website or web applications

13
Comments
2 min read
Cybersecurity Expert Interview: Whitney Champion

Cybersecurity Expert Interview: Whitney Champion

2
Comments
9 min read
Top 10 Python security best practices

Top 10 Python security best practices

13
Comments
5 min read
[Part 4/100] Security? Who is she

[Part 4/100] Security? Who is she

6
Comments 3
3 min read
On the hook of a phisher

On the hook of a phisher

1
Comments
9 min read
Rack-attack gem setup to protect Rails and Rack apps from bad clients

Rack-attack gem setup to protect Rails and Rack apps from bad clients

17
Comments 1
3 min read
The Ultimate Guide to Assess IAM infrastructure!

The Ultimate Guide to Assess IAM infrastructure!

6
Comments
6 min read
SHH! Conductor has secrets!

SHH! Conductor has secrets!

1
Comments
4 min read
How I Landed A Job In Cyber Security With No Professional Experience, Certifications, Nor A Degree

How I Landed A Job In Cyber Security With No Professional Experience, Certifications, Nor A Degree

6
Comments
14 min read
How to Secure Nodejs Application.

How to Secure Nodejs Application.

10
Comments 1
8 min read
SQL Injections Explained

SQL Injections Explained

8
Comments 1
5 min read
Detecting intrusion in DevOps environments with AWS canary tokens

Detecting intrusion in DevOps environments with AWS canary tokens

13
Comments
4 min read
Visual Studio Database Project and Always Encrypted

Visual Studio Database Project and Always Encrypted

7
Comments
4 min read
Pip Install Malware?!

Pip Install Malware?!

26
Comments 8
3 min read
InfoSec jobs at remote-first companies

InfoSec jobs at remote-first companies

3
Comments
2 min read
Improve the Security of API Keys [Checklist included]

Improve the Security of API Keys [Checklist included]

8
Comments
2 min read
GraphQL Armor: A middleware to make your GraphQL endpoints secure

GraphQL Armor: A middleware to make your GraphQL endpoints secure

32
Comments 1
1 min read
SvelteKit Content Security Policy: CSP for XSS Protection

SvelteKit Content Security Policy: CSP for XSS Protection

6
Comments
11 min read
Why should you become a network engineer?

Why should you become a network engineer?

5
Comments
4 min read
Top 10 Node.js security best practices

Top 10 Node.js security best practices

29
Comments 2
6 min read
Cybersecurity Programming: SQL Injection Scanner with Python

Cybersecurity Programming: SQL Injection Scanner with Python

20
Comments
1 min read
How to secure sensitive endpoints using JWT in Node.js

How to secure sensitive endpoints using JWT in Node.js

42
Comments 1
9 min read
Docker Content Trust on ACR with Azure Pipelines

Docker Content Trust on ACR with Azure Pipelines

12
Comments
7 min read
ENV vars and security

ENV vars and security

29
Comments
4 min read
4 benefits of an engineering approach to cybersecurity

4 benefits of an engineering approach to cybersecurity

2
Comments
5 min read
How to use SuperTokens' pre built UI with VueJS

How to use SuperTokens' pre built UI with VueJS

7
Comments 1
7 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

4
Comments
4 min read
10 Security tips for developers

10 Security tips for developers

7
Comments
6 min read
How to create a backdoor for your Google account so you will never* get locked out again 🔑💻

How to create a backdoor for your Google account so you will never* get locked out again 🔑💻

8
Comments
4 min read
Understanding OAuth and OIDC: Introduction

Understanding OAuth and OIDC: Introduction

5
Comments
2 min read
How to use environment variables with cl-dotenv in a Common Lisp web app

How to use environment variables with cl-dotenv in a Common Lisp web app

12
Comments
2 min read
What is Rootkit?

What is Rootkit?

6
Comments
2 min read
Prevent sensitive data exposure in log with Serilog

Prevent sensitive data exposure in log with Serilog

7
Comments 4
2 min read
How to Automate REST API Security Testing

How to Automate REST API Security Testing

99
Comments 6
2 min read
How to create a SFTP server on EC2(CentOS/Ubuntu) ?

How to create a SFTP server on EC2(CentOS/Ubuntu) ?

29
Comments 1
4 min read
C#: Modify Claims via Middleware in ASP.NET

C#: Modify Claims via Middleware in ASP.NET

14
Comments 5
3 min read
Using AWS JWT authorizers with Auth0

Using AWS JWT authorizers with Auth0

9
Comments
8 min read
🪄 Introducing jq tricks to Grype-Contribs

🪄 Introducing jq tricks to Grype-Contribs

1
Comments 4
1 min read
Protect Your Angular App From Cross-Site Scripting

Protect Your Angular App From Cross-Site Scripting

14
Comments
12 min read
AWS GuardDuty - Now Packing Malware protections

AWS GuardDuty - Now Packing Malware protections

4
Comments
1 min read
How to effectively implement Static Application Security Testing (SAST)?

How to effectively implement Static Application Security Testing (SAST)?

2
Comments
7 min read
How to apply security at the source using GitOps

How to apply security at the source using GitOps

3
Comments
13 min read
Closing that busines logic attack vector

Closing that busines logic attack vector

12
Comments
2 min read
AWS re:Inforce 2022 keynote highlights

AWS re:Inforce 2022 keynote highlights

12
Comments
3 min read
Protect Your Angular App From Cross-Site Request Forgery

Protect Your Angular App From Cross-Site Request Forgery

13
Comments
3 min read
Amazon GuardDuty and AWS Security Hub - Incident response with the help of detective controls

Amazon GuardDuty and AWS Security Hub - Incident response with the help of detective controls

6
Comments
6 min read
How hackers steal MetaMask seed? And how to protect it from their attack?

How hackers steal MetaMask seed? And how to protect it from their attack?

6
Comments
1 min read
What is Cross-Site Scripting vulnerability? How to find it? How to prevent a XSS attack?

What is Cross-Site Scripting vulnerability? How to find it? How to prevent a XSS attack?

5
Comments
4 min read
Securing Kubernetes Cluster using Kubescape and kube-bench

Securing Kubernetes Cluster using Kubescape and kube-bench

5
Comments
11 min read
Script tag integrity attribute

Script tag integrity attribute

7
Comments 1
2 min read
RBAC with OPA

RBAC with OPA

6
Comments
9 min read
Hazardous implementation of password reset

Hazardous implementation of password reset

12
Comments
3 min read
How to fuzz java code with jazzer?

How to fuzz java code with jazzer?

9
Comments 2
6 min read
DevSecOps: A Complete Guide

DevSecOps: A Complete Guide

21
Comments
8 min read
loading...