DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Strengthen OpenSSH Security through Ansible and GitHub Actions

Strengthen OpenSSH Security through Ansible and GitHub Actions

1
Comments
6 min read
Managing API Exposure: Risks and Best Practices

Managing API Exposure: Risks and Best Practices

Comments
1 min read
Should I Hide My Admin Login Page? Yes, You Should!

Should I Hide My Admin Login Page? Yes, You Should!

2
Comments
4 min read
Mastering Security: A Comprehensive Collection of Free Programming Tutorials

Mastering Security: A Comprehensive Collection of Free Programming Tutorials

Comments
4 min read
Authentication and Authorization - the correct way!

Authentication and Authorization - the correct way!

2
Comments
9 min read
What is the Security Group in AWS?

What is the Security Group in AWS?

Comments
1 min read
HackerOne 101: Grammarly Model Poisoning Attacks

HackerOne 101: Grammarly Model Poisoning Attacks

Comments
3 min read
Top 26 AWS Security Best Practices to Ensure Production Safety in 2024🔐

Top 26 AWS Security Best Practices to Ensure Production Safety in 2024🔐

13
Comments 2
3 min read
Unifying Documentation and Provenance for AI and ML: A Developer’s Guide to Navigating the Chaos

Unifying Documentation and Provenance for AI and ML: A Developer’s Guide to Navigating the Chaos

51
Comments
4 min read
How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

How Minecraft Hypixel Scammers Are Getting Away With Your Accounts

1
Comments
5 min read
10 MLOps Tools That Comply With the EU AI Act

10 MLOps Tools That Comply With the EU AI Act

77
Comments 2
9 min read
How to Configure WireGuard VPN in the Cloud

How to Configure WireGuard VPN in the Cloud

11
Comments
7 min read
Implementing Network Security: A Guide to Modern Methodologies

Implementing Network Security: A Guide to Modern Methodologies

12
Comments 1
5 min read
Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Cybersecurity 101: Understanding Threats, Vulnerabilities, and Exploits 🛡️

Comments
3 min read
Automated Security Operations with Safeline WAF (Part 1)

Automated Security Operations with Safeline WAF (Part 1)

12
Comments
4 min read
Google reCAPTCHA for Vue.js/Nuxt.js : App & Form Spam Shield

Google reCAPTCHA for Vue.js/Nuxt.js : App & Form Spam Shield

1
Comments
6 min read
Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SARIF, And More…

Get Caught Up With ggshield: New Ways To Install, Custom Remediation Messages, SARIF, And More…

4
Comments
8 min read
E-commerce website vulnerability bounty practice sharing(Ⅱ)

E-commerce website vulnerability bounty practice sharing(Ⅱ)

Comments
1 min read
Authentications methods for REST APIs

Authentications methods for REST APIs

Comments
2 min read
Beginner’s Guide to AES Encryption and Decryption in JavaScript using CryptoJS

Beginner’s Guide to AES Encryption and Decryption in JavaScript using CryptoJS

2
Comments
4 min read
A Critical Fix for a 5-Year Old Vulnerability through Docker's Security Patch

A Critical Fix for a 5-Year Old Vulnerability through Docker's Security Patch

Comments
2 min read
Manage secrets in AWS EKS with AWS Secrets Manager securely

Manage secrets in AWS EKS with AWS Secrets Manager securely

14
Comments
10 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
Trending WebDev in September 2024

Trending WebDev in September 2024

Comments
2 min read
Integrate Self-host Infisical into your NestJS project

Integrate Self-host Infisical into your NestJS project

3
Comments
3 min read
Making Passwords Optional: What You Need to Know

Making Passwords Optional: What You Need to Know

3
Comments
3 min read
Starting to Care About Security

Starting to Care About Security

Comments
5 min read
Security Posture for Production Grade K8 Cluster

Security Posture for Production Grade K8 Cluster

Comments
4 min read
Validation Techniques

Validation Techniques

12
Comments 2
1 min read
Database 101: SSL/TLS for beginners

Database 101: SSL/TLS for beginners

269
Comments 7
17 min read
🚀 Enhancing Container Security: The Complete Guide to Secure and Clean Kubernetes Clusters 🛡️🧼

🚀 Enhancing Container Security: The Complete Guide to Secure and Clean Kubernetes Clusters 🛡️🧼

1
Comments
4 min read
Drupal GovCon 2024: Securing The Government's Open-Source Web Applications

Drupal GovCon 2024: Securing The Government's Open-Source Web Applications

Comments
6 min read
Controlling Job Execution with Conditions in GitHub Actions

Controlling Job Execution with Conditions in GitHub Actions

10
Comments
4 min read
API Security Testing with Damn Vulnerable API (DVAPI)

API Security Testing with Damn Vulnerable API (DVAPI)

Comments
5 min read
Building a Password Strength Checker in Python

Building a Password Strength Checker in Python

1
Comments
3 min read
Streamlining SSH Key Management

Streamlining SSH Key Management

6
Comments
4 min read
You do not know, what you do not know.

You do not know, what you do not know.

Comments
2 min read
Securing Your Website with Basic Auth for NGINX

Securing Your Website with Basic Auth for NGINX

1
Comments
4 min read
AWS Security Groups, Instance Types, and EC2 Pricing - Week Ten

AWS Security Groups, Instance Types, and EC2 Pricing - Week Ten

Comments
3 min read
🔐 Information Security and Data Privacy: Protect Your Online Information

🔐 Information Security and Data Privacy: Protect Your Online Information

2
Comments
3 min read
How to Generate RSA Key Using JavaScript and Python

How to Generate RSA Key Using JavaScript and Python

Comments
4 min read
Guardians of the Records: Casting Spells for Secure Sharing in Dataverse

Guardians of the Records: Casting Spells for Secure Sharing in Dataverse

11
Comments
3 min read
Security news weekly round-up - 11th October 2024

Security news weekly round-up - 11th October 2024

1
Comments
3 min read
Top 10 Tips with Code Examples: C# Application Security

Top 10 Tips with Code Examples: C# Application Security

13
Comments 1
8 min read
IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

IT Security Made Simple: Protecting Your Digital Life Like a Pro! 🔒

1
Comments
2 min read
Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Comments
5 min read
5 AI-Powered Content Detectors to Help Identify AI-Generated Text

5 AI-Powered Content Detectors to Help Identify AI-Generated Text

2
Comments
5 min read
Cybersecurity – Protecting Your Business in the Digital Age

Cybersecurity – Protecting Your Business in the Digital Age

Comments
4 min read
What happens when a user tries to access a resource in AWS ?

What happens when a user tries to access a resource in AWS ?

Comments
1 min read
Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

1
Comments
7 min read
API7 Enterprise v3.2.16: Integrated Secret Providers

API7 Enterprise v3.2.16: Integrated Secret Providers

1
Comments
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

2
Comments 1
5 min read
Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Comments
4 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

2
Comments 3
10 min read
Dockerfile Best Practices: Writing Efficient and Secure Docker Images

Dockerfile Best Practices: Writing Efficient and Secure Docker Images

49
Comments 4
4 min read
BotKube: Integrando o agente de monitoramento com o Slack

BotKube: Integrando o agente de monitoramento com o Slack

4
Comments
2 min read
Create a self-signed certificate with your own root CA

Create a self-signed certificate with your own root CA

1
Comments
2 min read
Introduction to Minder

Introduction to Minder

2
Comments
2 min read
E-commerce website vulnerability bounty practice sharing(I)

E-commerce website vulnerability bounty practice sharing(I)

Comments
2 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
loading...