DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
User Office Hours: Using the Snyk CLI for Static Code Analysis

User Office Hours: Using the Snyk CLI for Static Code Analysis

2
Comments
1 min read
Working With add-mask and GitHub Actions for dynamic secrets

Working With add-mask and GitHub Actions for dynamic secrets

Comments
5 min read
Secure your web apps with an API Gateway

Secure your web apps with an API Gateway

49
Comments
7 min read
SAST and DAST: what's the difference?

SAST and DAST: what's the difference?

8
Comments
5 min read
The MSSP Guide to Keycloak

The MSSP Guide to Keycloak

6
Comments
6 min read
CSRF, XXE, and 12 Other Security Acronyms Explained

CSRF, XXE, and 12 Other Security Acronyms Explained

8
Comments
3 min read
Veinmind:An open source container security detection tool

Veinmind:An open source container security detection tool

8
Comments
2 min read
What would you do if your encrypted credentials and the key got compromised?

What would you do if your encrypted credentials and the key got compromised?

27
Comments 2
2 min read
Docker SBOM

Docker SBOM

11
Comments
3 min read
Mobile Game Security and Hacking Types

Mobile Game Security and Hacking Types

10
Comments 1
3 min read
DevSecOps best practices

DevSecOps best practices

14
Comments
3 min read
Benefits and working of DevSecOps

Benefits and working of DevSecOps

9
Comments
3 min read
Why is DevSecOps so important?

Why is DevSecOps so important?

7
Comments
3 min read
picoCTF 2022 ~NSA Backdoor writeup~

picoCTF 2022 ~NSA Backdoor writeup~

6
Comments
4 min read
RegEx password validators is madness

RegEx password validators is madness

32
Comments 9
2 min read
Please remove that .git folder

Please remove that .git folder

296
Comments 42
2 min read
Managing AWS IAM with Terraform - Part 1

Managing AWS IAM with Terraform - Part 1

13
Comments 1
6 min read
Building secure ecommerce

Building secure ecommerce

28
Comments
9 min read
AWS Service Principals for IAM

AWS Service Principals for IAM

14
Comments
1 min read
picoCTF 2022 ~transposition-trial writeup~

picoCTF 2022 ~transposition-trial writeup~

7
Comments
1 min read
Does Kubernetes support SELinux?

Does Kubernetes support SELinux?

16
Comments
3 min read
Is your Kubernetes API Server exposed? Learn how to check and fix!

Is your Kubernetes API Server exposed? Learn how to check and fix!

7
Comments
1 min read
Use git-secret to encrypt secrets in the repository [Tutorial Part 6]

Use git-secret to encrypt secrets in the repository [Tutorial Part 6]

90
Comments 10
29 min read
Cloud and the shared responsibility model misconceptions

Cloud and the shared responsibility model misconceptions

7
Comments
5 min read
Cryptography basics: breaking repeated-key XOR ciphertext

Cryptography basics: breaking repeated-key XOR ciphertext

21
Comments 2
7 min read
CI/CD pipeline attacks: A growing threat to enterprise security

CI/CD pipeline attacks: A growing threat to enterprise security

2
Comments
6 min read
Security vs. Performance in the SQL World

Security vs. Performance in the SQL World

5
Comments
7 min read
picoCTF 2022 ~basic-mod1 writeup~

picoCTF 2022 ~basic-mod1 writeup~

5
Comments
2 min read
What is Minimum Viable Security (MVS) and how does it improve the life of developers?

What is Minimum Viable Security (MVS) and how does it improve the life of developers?

6
Comments 1
6 min read
Distributing API Authorization Policies using OPA Bundles

Distributing API Authorization Policies using OPA Bundles

4
Comments
3 min read
How to protect your password from hackers

How to protect your password from hackers

6
Comments
4 min read
🔒 How to build an end-to-end encrypted chat, with PubNub and Seald 💬

🔒 How to build an end-to-end encrypted chat, with PubNub and Seald 💬

6
Comments
12 min read
Learning by auditing Kubernetes manifests

Learning by auditing Kubernetes manifests

9
Comments
5 min read
Safe and predictable inline scripts

Safe and predictable inline scripts

10
Comments
4 min read
AngularJS & Django with CSRF_COOKIE_HTTPONLY

AngularJS & Django with CSRF_COOKIE_HTTPONLY

5
Comments
2 min read
Why do we use port 8080 for http in some webservers?

Why do we use port 8080 for http in some webservers?

8
Comments 2
1 min read
Wonder why things do not go crazy when you deploy in the Cloud?AWS Security Groups to the rescue

Wonder why things do not go crazy when you deploy in the Cloud?AWS Security Groups to the rescue

10
Comments 1
1 min read
Secure AWS VPC using Public and Private Subnets

Secure AWS VPC using Public and Private Subnets

26
Comments 2
14 min read
How to Build a Verification Code Based Sign Up

How to Build a Verification Code Based Sign Up

12
Comments
6 min read
Using Python to Flood Scammers with Fake Passwords

Using Python to Flood Scammers with Fake Passwords

3
Comments
3 min read
How to Protect Your Django Project's Secret Key

How to Protect Your Django Project's Secret Key

17
Comments
2 min read
Top 10 Web Application Security Solutions

Top 10 Web Application Security Solutions

11
Comments 4
3 min read
Level up Your Webhook Security With Appwrite 0.15

Level up Your Webhook Security With Appwrite 0.15

50
Comments
2 min read
Why I chose Auth0 for my startup

Why I chose Auth0 for my startup

9
Comments
4 min read
Debugging a GetSessionToken issue

Debugging a GetSessionToken issue

4
Comments
3 min read
Web Application Security Best Practices

Web Application Security Best Practices

7
Comments
5 min read
What is web application security and why is it important

What is web application security and why is it important

6
Comments
3 min read
Web Security Considerations

Web Security Considerations

5
Comments
3 min read
⚖️ Kafka image : wurstmeister vs. bitnami

⚖️ Kafka image : wurstmeister vs. bitnami

6
Comments 1
1 min read
APIs to humans - Curse or Blessing?

APIs to humans - Curse or Blessing?

6
Comments 4
2 min read
NodeSecure CLI v2.0.0

NodeSecure CLI v2.0.0

22
Comments
6 min read
Building a secure CI/CD pipeline with GitHub Actions

Building a secure CI/CD pipeline with GitHub Actions

6
Comments
1 min read
Basics of Encryption: The Diffie-Hellman Key Exchange Explained

Basics of Encryption: The Diffie-Hellman Key Exchange Explained

10
Comments
4 min read
Lambda Rust Extension for any Runtime to preload SSM Parameters as Secure Environment Variables!

Lambda Rust Extension for any Runtime to preload SSM Parameters as Secure Environment Variables!

5
Comments
4 min read
Secure Proxy for HIPAA-Compliant API Analytics

Secure Proxy for HIPAA-Compliant API Analytics

5
Comments
7 min read
Lambda Rust Extension for any Runtime to preload SSM Parameters as Secure Environment Variables!

Lambda Rust Extension for any Runtime to preload SSM Parameters as Secure Environment Variables!

7
Comments
4 min read
Need for Security Testing of Mobile Apps

Need for Security Testing of Mobile Apps

2
Comments
5 min read
MQTT policy enforcement with Pipy

MQTT policy enforcement with Pipy

8
Comments
4 min read
Integrating Hashicorp vault with AWS and Keycloak

Integrating Hashicorp vault with AWS and Keycloak

3
Comments
3 min read
Steps to Build a Zero Trust Architecture for Educational Institutions

Steps to Build a Zero Trust Architecture for Educational Institutions

5
Comments
6 min read
loading...