DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Whitelist IP addresses for Lambda function URLs

Whitelist IP addresses for Lambda function URLs

Comments
3 min read
Hacked Server

Hacked Server

3
Comments
3 min read
Deploying a Custom WAF v2 Rule with the AWS CDK

Deploying a Custom WAF v2 Rule with the AWS CDK

Comments
3 min read
You should use the OpenSSF Scorecard

You should use the OpenSSF Scorecard

5
Comments
3 min read
5 Creative Uses of Magic Links

5 Creative Uses of Magic Links

4
Comments
5 min read
Kube-bench and Popeye: A Power Duo for AKS Security Compliance

Kube-bench and Popeye: A Power Duo for AKS Security Compliance

2
Comments
29 min read
Streamlining incident response investigations with Steampipe relationship graphs

Streamlining incident response investigations with Steampipe relationship graphs

2
Comments
4 min read
Secret Management in Kubernetes: Approaches, Tools, and Best Practices

Secret Management in Kubernetes: Approaches, Tools, and Best Practices

1
Comments
9 min read
New Managed Policies for Amazon Detective

New Managed Policies for Amazon Detective

Comments
2 min read
3 Quick Tips for Input Validation

3 Quick Tips for Input Validation

5
Comments
3 min read
Secret Key Encryption with Go using AES

Secret Key Encryption with Go using AES

45
Comments 7
6 min read
Create value before generating any revenue, it will save your life

Create value before generating any revenue, it will save your life

2
Comments 1
3 min read
REST API for Security Package

REST API for Security Package

1
Comments
6 min read
Last week top 5 posts tagged(#security)

Last week top 5 posts tagged(#security)

4
Comments 1
1 min read
sudoedit (`sudo -e`) security flaw (CVE-2023-22809)

sudoedit (`sudo -e`) security flaw (CVE-2023-22809)

4
Comments 7
1 min read
Protected Routes in React Router V6

Protected Routes in React Router V6

1
Comments 1
2 min read
Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022

Software Supply Chain and Data Infrastructure Security - 5 lessons from AllDayDevOps 2022

2
Comments
8 min read
5 Application Security Tips for Developers

5 Application Security Tips for Developers

2
Comments
4 min read
How To Secure Your CI/CD Pipeline

How To Secure Your CI/CD Pipeline

1
Comments
5 min read
SlashID sign-in/sign-up React components

SlashID sign-in/sign-up React components

3
Comments
2 min read
How to Implement OpenID on AWS

How to Implement OpenID on AWS

4
Comments
4 min read
How I secured sensitive information in GitLab environment variable and made pipeline secured

How I secured sensitive information in GitLab environment variable and made pipeline secured

3
Comments 1
4 min read
Ultimate Roadmap To Ethical Hacking

Ultimate Roadmap To Ethical Hacking

6
Comments
3 min read
Token Gating Websites with Collab.Land

Token Gating Websites with Collab.Land

6
Comments
2 min read
sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)

sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)

2
Comments
1 min read
7 Tips for Low-Friction Authentication

7 Tips for Low-Friction Authentication

3
Comments
9 min read
Risk scoring your API Specification with Panoptica

Risk scoring your API Specification with Panoptica

4
Comments
6 min read
Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Comments
8 min read
Kubernetes Security Best Practices For Developers

Kubernetes Security Best Practices For Developers

13
Comments
6 min read
QuillCTF: 5. D31eg4t3

QuillCTF: 5. D31eg4t3

Comments
3 min read
Quill CTF: 4. Safe NFT

Quill CTF: 4. Safe NFT

Comments
3 min read
Default to Deny for More Secure Apps

Default to Deny for More Secure Apps

2
Comments
3 min read
GitOps and Kubernetes – Secure Handling of Secrets

GitOps and Kubernetes – Secure Handling of Secrets

2
Comments
5 min read
Fetching Google Groups with SlashID SSO

Fetching Google Groups with SlashID SSO

1
Comments
4 min read
Beginners’ Guide To Run A Linux Server Securely

Beginners’ Guide To Run A Linux Server Securely

16
Comments 2
5 min read
Better Performance and Security by Monitoring Logs, Metrics, and More

Better Performance and Security by Monitoring Logs, Metrics, and More

10
Comments 1
10 min read
Python Django: Create a more secure database by using a custom field

Python Django: Create a more secure database by using a custom field

3
Comments
2 min read
Managing CircleCI secrets via Terraform

Managing CircleCI secrets via Terraform

2
Comments
3 min read
What are AWS credentials?

What are AWS credentials?

6
Comments
5 min read
Access TiDB Cloud by Hashicorp Vault

Access TiDB Cloud by Hashicorp Vault

Comments
4 min read
The uncrackable back door : The intersection of mathematics, AI, politics and ethics

The uncrackable back door : The intersection of mathematics, AI, politics and ethics

2
Comments
8 min read
JS-X-Ray 6.0

JS-X-Ray 6.0

5
Comments 1
3 min read
HR Technology Trends in 2023: Digitalization with a Human Touch

HR Technology Trends in 2023: Digitalization with a Human Touch

13
Comments
11 min read
IAM Best Practices

IAM Best Practices

4
Comments
4 min read
Multiple authentication in Laravel 9

Multiple authentication in Laravel 9

2
Comments
3 min read
How to create a Password Generator using JavaScript

How to create a Password Generator using JavaScript

1
Comments
4 min read
Blackbox - Secrets amongst your code

Blackbox - Secrets amongst your code

1
Comments
2 min read
AWS Security Stories #04.4: OWASP - Injection

AWS Security Stories #04.4: OWASP - Injection

1
Comments
4 min read
Any tutorial on how to encrypt devices?

Any tutorial on how to encrypt devices?

2
Comments 2
1 min read
Protect Your System from Install Scripts in npm packages

Protect Your System from Install Scripts in npm packages

2
Comments
2 min read
Cibersecurity, construindo um firewall humano.

Cibersecurity, construindo um firewall humano.

4
Comments 3
5 min read
You need to implement this email check

You need to implement this email check

2
Comments 1
3 min read
How to secure a web server (VPS)

How to secure a web server (VPS)

2
Comments
8 min read
Don't Skimp on Security: Add These Must-Have Features to Your Web Apps

Don't Skimp on Security: Add These Must-Have Features to Your Web Apps

4
Comments 2
9 min read
Preventing Installing Composer Dependencies with Known Security Vulnerabilities

Preventing Installing Composer Dependencies with Known Security Vulnerabilities

6
Comments
4 min read
AWS Create Bastion Host to communicate with your Private Subnet

AWS Create Bastion Host to communicate with your Private Subnet

1
Comments
4 min read
AWS Security Stories #04.3: OWASP - XSS

AWS Security Stories #04.3: OWASP - XSS

Comments
4 min read
What is the ideal session timeout?

What is the ideal session timeout?

1
Comments 1
1 min read
How To Manually Verify x509 Certificate Chains in .NET

How To Manually Verify x509 Certificate Chains in .NET

7
Comments 2
7 min read
AWS Security Stories #04.2: OWASP - SSRF

AWS Security Stories #04.2: OWASP - SSRF

3
Comments
4 min read
loading...