DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Linux Permissions

Understanding Linux Permissions

17
Comments
2 min read
Securing the Cloud #32

Securing the Cloud #32

Comments
5 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

OAuth Impersonation Attack: Misconfiguration of Facebook and Google OAuth Leading to Account Takeover Crisis

Comments
2 min read
Cryptography #0 - Essential Concepts

Cryptography #0 - Essential Concepts

5
Comments
7 min read
Introducing OpenSSF Scorecard for OpenSauced

Introducing OpenSSF Scorecard for OpenSauced

15
Comments 1
5 min read
Secure Data and Safeguard Users an App With End-to-End Encryption

Secure Data and Safeguard Users an App With End-to-End Encryption

Comments
9 min read
Is magic link sign-in dying? A closer look at its declining popularity

Is magic link sign-in dying? A closer look at its declining popularity

22
Comments 2
3 min read
Day 8: Mastering Bash Scripting in DevOps

Day 8: Mastering Bash Scripting in DevOps

3
Comments
2 min read
Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

Top 5 Techniques to Protect Web Apps from Unauthorized JavaScript Execution

2
Comments 1
9 min read
Protect Sensitive Pages With Nginx

Protect Sensitive Pages With Nginx

2
Comments
2 min read
What is Secrets Scanning? How to Protect Your Application Data

What is Secrets Scanning? How to Protect Your Application Data

5
Comments
8 min read
How to easily fix OpenSSH RegreSSHion vulnerability

How to easily fix OpenSSH RegreSSHion vulnerability

Comments
2 min read
How to test and secure a mail server in Debian and Ubuntu with ispmanager

How to test and secure a mail server in Debian and Ubuntu with ispmanager

6
Comments
10 min read
CĂłmo aplicar un Well Architected Review para asegurar tu infraestructura. Primera parte.

CĂłmo aplicar un Well Architected Review para asegurar tu infraestructura. Primera parte.

Comments
7 min read
Why Python Is Good For Cybersecurity

Why Python Is Good For Cybersecurity

10
Comments 2
4 min read
Enhancing Data Security with AES Encryption in Java 🚀🔒

Enhancing Data Security with AES Encryption in Java 🚀🔒

Comments
2 min read
How To Stop Form Bots With Honeypot Fields

How To Stop Form Bots With Honeypot Fields

32
Comments 13
3 min read
Challenge with RBAC Authentication

Challenge with RBAC Authentication

2
Comments
2 min read
How to provision an AWS WAF using AWS CDK

How to provision an AWS WAF using AWS CDK

2
Comments
4 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 1

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 1

12
Comments
3 min read
CAPTCHA: Security Theater or AI Training Tool?

CAPTCHA: Security Theater or AI Training Tool?

Comments
4 min read
Code Smell 261 - DigiCert Underscores

Code Smell 261 - DigiCert Underscores

3
Comments
2 min read
Docker Images for Go (Golang) Small, Faster Docker Images and Security

Docker Images for Go (Golang) Small, Faster Docker Images and Security

30
Comments 1
4 min read
Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)

Configuring Data Collection and Analytics in Microsoft Sentinel (Part 3)

Comments
3 min read
loading...