DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
You're Installing Node.js Wrong. That's OK, Here Is How To Fix It 🙌

You're Installing Node.js Wrong. That's OK, Here Is How To Fix It 🙌

13
Comments 2
3 min read
Start to Learn Secure App with Ruby on Rails

Start to Learn Secure App with Ruby on Rails

3
Comments
6 min read
Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

Elevating Security with Meta-Exein: Achieving Yocto Project Compatibility

1
Comments
2 min read
The importance of stateless architecture in authorization systems

The importance of stateless architecture in authorization systems

Comments
7 min read
GitLab Vulnerabilities And Security Incidents: 2023 In Review

GitLab Vulnerabilities And Security Incidents: 2023 In Review

Comments
7 min read
A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey

A Secure, Privacy-First AI-driven Data Collection Platform: BlockSurvey

5
Comments
2 min read
Nodejs Security - What You Need To Know - Live Stream

Nodejs Security - What You Need To Know - Live Stream

11
Comments 1
2 min read
Quick guide to secure/encrypt your properties in MuleSoft

Quick guide to secure/encrypt your properties in MuleSoft

1
Comments
1 min read
Checklist for designing cloud-native applications – Part 2: Security aspects

Checklist for designing cloud-native applications – Part 2: Security aspects

2
Comments
7 min read
Finding the Optimal Bcrypt Rounds for Your Machine

Finding the Optimal Bcrypt Rounds for Your Machine

Comments
3 min read
Understanding Bcrypt Rounds: Balancing Security and Performance

Understanding Bcrypt Rounds: Balancing Security and Performance

Comments
2 min read
Help: Trying to read the Private Key from Windows Certificate Store for Mutual Authentication

Help: Trying to read the Private Key from Windows Certificate Store for Mutual Authentication

Comments
1 min read
Accessing local services with SSRF attacks

Accessing local services with SSRF attacks

5
Comments
5 min read
Understanding SDLC and How Security Plays Into it

Understanding SDLC and How Security Plays Into it

1
Comments
5 min read
How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

Comments
5 min read
Democratising Enterprise Readiness - #MarchWebSecurity

Democratising Enterprise Readiness - #MarchWebSecurity

11
Comments 1
4 min read
GitHub Actions for Secret Management

GitHub Actions for Secret Management

13
Comments
3 min read
Unlocking the Power of WebAssembly

Unlocking the Power of WebAssembly

Comments
4 min read
Understanding Linux Basic Permissions: A Comprehensive Guide

Understanding Linux Basic Permissions: A Comprehensive Guide

1
Comments
2 min read
Security in FastAPI: Best practices to protect your application (Part I)

Security in FastAPI: Best practices to protect your application (Part I)

Comments
4 min read
Biometric authentication with Passkeys

Biometric authentication with Passkeys

3
Comments
6 min read
The Role of CNAPP in Modern DevSecOps

The Role of CNAPP in Modern DevSecOps

Comments
5 min read
Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

1
Comments
8 min read
Securing Your Node.js Application: Best Practices and Strategies

Securing Your Node.js Application: Best Practices and Strategies

1
Comments
3 min read
What's New With AWS Security? | February Edition

What's New With AWS Security? | February Edition

3
Comments 1
3 min read
Building Digital Trust: A Look at Top Identity Verification Solutions

Building Digital Trust: A Look at Top Identity Verification Solutions

Comments
2 min read
User Login Systems: An Overview

User Login Systems: An Overview

Comments
5 min read
What Are The Risks of a Quantum Apocalypse, and Should We Worry?

What Are The Risks of a Quantum Apocalypse, and Should We Worry?

1
Comments 1
8 min read
The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

The New Normal: COVID-19’s Enduring Impact on Remote Work and Cloud Technologies

Comments
3 min read
Securing Fedora Linux with SELinux: A Comprehensive Guide

Securing Fedora Linux with SELinux: A Comprehensive Guide

2
Comments
3 min read
Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Enhancing Cyber Resilience: The Importance of Cyber Security Audits and Assessments

Comments
2 min read
Let's Play Snyk 🐶

Let's Play Snyk 🐶

2
Comments 4
5 min read
To Polyfill Or Not To Polyfill.io

To Polyfill Or Not To Polyfill.io

16
Comments
4 min read
How to hide files or data in a JPEG Image

How to hide files or data in a JPEG Image

38
Comments 11
4 min read
Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Comments
5 min read
Optimizing Security in the Cloud: Leveraging the Microsoft 365 Security Baseline

Optimizing Security in the Cloud: Leveraging the Microsoft 365 Security Baseline

Comments
3 min read
Goal-Based Penetration Testing

Goal-Based Penetration Testing

Comments
1 min read
Realizing an RBAC scheme in Laravel Nova

Realizing an RBAC scheme in Laravel Nova

Comments
1 min read
Secure and Efficient Administrator Management in Modern Applications

Secure and Efficient Administrator Management in Modern Applications

1
Comments
2 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
Issue 34 of AWS Cloud Security Weekly

Issue 34 of AWS Cloud Security Weekly

Comments
2 min read
AWS VPC Endpoint is JUST a FinOps topic!?

AWS VPC Endpoint is JUST a FinOps topic!?

2
Comments
3 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
From Novice to Expert: Building Robust Security with Kubernetes RBAC

From Novice to Expert: Building Robust Security with Kubernetes RBAC

Comments
3 min read
Top 10 Security Best Practices we learned the hard way

Top 10 Security Best Practices we learned the hard way

8
Comments 2
9 min read
Enhance Kubernetes Protection using SecurityContext Capabilities

Enhance Kubernetes Protection using SecurityContext Capabilities

Comments 1
3 min read
Exploring Port Scanning with the "net" Package in Go

Exploring Port Scanning with the "net" Package in Go

Comments
4 min read
What if anyone steals your JWT

What if anyone steals your JWT

Comments
1 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
A simple tip to find hidden gems in Shodan

A simple tip to find hidden gems in Shodan

Comments
2 min read
How to resolve vulnerabilities in Front-End Applications

How to resolve vulnerabilities in Front-End Applications

2
Comments
4 min read
Ionic + Capacitor Security Tips

Ionic + Capacitor Security Tips

2
Comments
3 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

1
Comments
7 min read
Training data poisoning to get what you want in LLMs, A Question

Training data poisoning to get what you want in LLMs, A Question

Comments
2 min read
Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

25
Comments
3 min read
Dynamic AWS IAM Policies

Dynamic AWS IAM Policies

Comments
4 min read
Transfer contents and files using SCP from remote to local machine via bastion

Transfer contents and files using SCP from remote to local machine via bastion

3
Comments
2 min read
Proxy VS Reverse Proxy

Proxy VS Reverse Proxy

15
Comments 5
4 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

5
Comments
8 min read
The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

The Ultimate Guide to Hybrid Cloud Backup: Ensuring Data Safety in the Digital Age

Comments
3 min read
loading...