DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protecting Your APIs: Understanding Authentication and Authorization

Protecting Your APIs: Understanding Authentication and Authorization

2
Comments
4 min read
Secure transfer

Secure transfer

Comments
2 min read
Securing Java Web Applications: Best Practices and Java EE Features

Securing Java Web Applications: Best Practices and Java EE Features

1
Comments
9 min read
Cómo Realizar y Detectar Ataques de Path Injection

Cómo Realizar y Detectar Ataques de Path Injection

Comments
6 min read
How to Securely Remove a File from Git History: A Step-by-Step Guide

How to Securely Remove a File from Git History: A Step-by-Step Guide

1
Comments
3 min read
User Authentication 🔑: Your Ultimate Digital Shield ! 🛡️

User Authentication 🔑: Your Ultimate Digital Shield ! 🛡️

1
Comments
2 min read
Por que os arquivos excluídos são recuperados?

Por que os arquivos excluídos são recuperados?

Comments
6 min read
Cloud Security Measures

Cloud Security Measures

2
Comments 1
2 min read
7 Ways to Boost Your Cybersecurity Career with CISSP Certification

7 Ways to Boost Your Cybersecurity Career with CISSP Certification

Comments
3 min read
Insecure Direct Object References (IDOR) in Laravel

Insecure Direct Object References (IDOR) in Laravel

Comments
4 min read
Cloud Computing Security Best Practices for Enterprises

Cloud Computing Security Best Practices for Enterprises

Comments
7 min read
Using SSH to Connect Local Git to Remote Repositories

Using SSH to Connect Local Git to Remote Repositories

11
Comments
6 min read
Introducing Fleek Machines (Early Access): One Click Verified and Private Compute

Introducing Fleek Machines (Early Access): One Click Verified and Private Compute

6
Comments 1
2 min read
The Anatomy of a Wi-Fi Attack: Uncovering the Cracks in WPA/WPA2 Security

The Anatomy of a Wi-Fi Attack: Uncovering the Cracks in WPA/WPA2 Security

Comments
4 min read
php.ini Overview: Boost Performance, Security, and Flexibility

php.ini Overview: Boost Performance, Security, and Flexibility

Comments
2 min read
The Most Potent Security Control on AWS

The Most Potent Security Control on AWS

1
Comments
2 min read
Day 1 : Daily Notes for #30DayOfFLCode

Day 1 : Daily Notes for #30DayOfFLCode

2
Comments
2 min read
🔐 Why Your Team Needs Passbolt for Password Management

🔐 Why Your Team Needs Passbolt for Password Management

3
Comments
1 min read
🔐 Secure Your Apps with Best Practices ⬇️⬇️⬇️

🔐 Secure Your Apps with Best Practices ⬇️⬇️⬇️

8
Comments 3
1 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Web vulnerability bounty rules update

Web vulnerability bounty rules update

2
Comments
1 min read
Linux Privilege Escalation: Techniques and Examples

Linux Privilege Escalation: Techniques and Examples

Comments
5 min read
Introduction to Chaos Engineering and LitmusChaos

Introduction to Chaos Engineering and LitmusChaos

11
Comments 3
5 min read
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

2
Comments
2 min read
From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

From False Positives to Potential Breaches: The Risks of Prematurely Closing Incidents

Comments
6 min read
Reimagining cybersecurity for developers

Reimagining cybersecurity for developers

1
Comments
7 min read
What is Cloud Workload Security

What is Cloud Workload Security

Comments 1
2 min read
Dataverse Security Roles

Dataverse Security Roles

22
Comments
6 min read
KeyRunner: Not Just Another API Client-Your Secure Choice for API interactions in VSCode & Desktop!

KeyRunner: Not Just Another API Client-Your Secure Choice for API interactions in VSCode & Desktop!

Comments
1 min read
FUTURE OF TECHNOLOGY

FUTURE OF TECHNOLOGY

1
Comments
2 min read
DevSecOps?

DevSecOps?

5
Comments
3 min read
Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

Part 10: SQL Injection Series - The Psychology of Attackers and SQL Injection in Larger Attack Strategies

6
Comments 1
3 min read
Why Data Security is Broken and How to Fix it?

Why Data Security is Broken and How to Fix it?

1
Comments
5 min read
Chain of Trust: Decoding SSL Certificate Security Architecture

Chain of Trust: Decoding SSL Certificate Security Architecture

2
Comments
5 min read
Why Prioritizing Cloud Security Best Practices is Critical in 2024

Why Prioritizing Cloud Security Best Practices is Critical in 2024

Comments
5 min read
Part 7: SQL Injection Series: Advanced SQL Injection Techniques

Part 7: SQL Injection Series: Advanced SQL Injection Techniques

5
Comments 1
4 min read
Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Comments
13 min read
From Vulnerabilities to Vault: How We Stopped Hardcoding Secrets and Started Using Hashicorp Vault

From Vulnerabilities to Vault: How We Stopped Hardcoding Secrets and Started Using Hashicorp Vault

11
Comments 1
3 min read
How to Reset Your Local Git Branch

How to Reset Your Local Git Branch

Comments
5 min read
AI-Driven Election Security: Safeguarding Democracy in the Digital Age

AI-Driven Election Security: Safeguarding Democracy in the Digital Age

5
Comments
5 min read
Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

Comments
5 min read
How to Discard Local Changes in Git

How to Discard Local Changes in Git

5
Comments
5 min read
How to Become a Firewall Administrator: A Comprehensive Guide

How to Become a Firewall Administrator: A Comprehensive Guide

Comments
9 min read
Securing CI/CD Pipelines: GitHub Actions vs Jenkins

Securing CI/CD Pipelines: GitHub Actions vs Jenkins

8
Comments
5 min read
A Quick Look at the Problem of Data Poisoning in Language Models

A Quick Look at the Problem of Data Poisoning in Language Models

Comments
2 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Cuarta parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Cuarta parte

1
Comments
5 min read
Kubernetes Security: The Hidden Threats in Your Container Orchestra

Kubernetes Security: The Hidden Threats in Your Container Orchestra

2
Comments
3 min read
Setting up WireGuard VPN with WAG for Enhanced Security and MFA

Setting up WireGuard VPN with WAG for Enhanced Security and MFA

2
Comments
4 min read
SSRF Attacks: The Silent Threat Hiding in Your Server

SSRF Attacks: The Silent Threat Hiding in Your Server

Comments
1 min read
AWS AllowList "Update"

AWS AllowList "Update"

1
Comments
2 min read
Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Zero Trust for the Enterprise: Best Practices for a Seamless Transition to a Zero Trust Architecture !!

Comments
5 min read
Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Navigating AI-Driven Cyber Threats: How Enterprises Can Secure Their Data in the Age of Intelligent Attacks

Comments
5 min read
Encryption Symmetric

Encryption Symmetric

Comments
3 min read
Backpack - Configure User Access Control and Permissions in 10 minutes

Backpack - Configure User Access Control and Permissions in 10 minutes

Comments
4 min read
How to Detect and Defend Against SQL Injection Attacks - Part 2

How to Detect and Defend Against SQL Injection Attacks - Part 2

7
Comments 1
4 min read
Security news weekly round-up - 15th November 2024

Security news weekly round-up - 15th November 2024

3
Comments
3 min read
Meme Monday

Meme Monday

10
Comments
1 min read
Simplifying Authentication in React Applications with Clerk

Simplifying Authentication in React Applications with Clerk

6
Comments 4
3 min read
How to create a sudo user

How to create a sudo user

Comments
4 min read
Allowing any app on macOS

Allowing any app on macOS

8
Comments
1 min read
loading...