DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Insomni’Hack : un rĂ©sumĂ© des confs que nous avons vu

Insomni’Hack : un rĂ©sumĂ© des confs que nous avons vu

4
Comments
3 min read
How I scanned dev.to APIs for vulnerabilities

How I scanned dev.to APIs for vulnerabilities

32
Comments 3
1 min read
CloudFront Standing In the Front

CloudFront Standing In the Front

15
Comments
4 min read
How to spot poor implementations of 2FA

How to spot poor implementations of 2FA

10
Comments
2 min read
Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

9
Comments
8 min read
Kubernetes least privilege implementation using the Google Cloud as an example

Kubernetes least privilege implementation using the Google Cloud as an example

9
Comments
7 min read
Lets talk a bit about ISO/IEC 27001

Lets talk a bit about ISO/IEC 27001

10
Comments 1
5 min read
Controlling access to the API with Lambda authorizers

Controlling access to the API with Lambda authorizers

12
Comments
6 min read
From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

5
Comments
4 min read
Role of a SecOps Center, SecOps team, & SecOps with AI

Role of a SecOps Center, SecOps team, & SecOps with AI

7
Comments
3 min read
AWS is only as safe as the weakest credentials setup for your developers.

AWS is only as safe as the weakest credentials setup for your developers.

13
Comments
10 min read
No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

9
Comments 1
7 min read
OhjelmistokehittÀjÀstÀ eettiseksi hakkeriksi

OhjelmistokehittÀjÀstÀ eettiseksi hakkeriksi

3
Comments
2 min read
What is SecOps and Its Benefits

What is SecOps and Its Benefits

5
Comments
3 min read
Enarx: The future of Trusted Execution Environment Frameworks

Enarx: The future of Trusted Execution Environment Frameworks

11
Comments
3 min read
https

https

6
Comments
4 min read
Little step to use PKI easiest

Little step to use PKI easiest

10
Comments
7 min read
Getting Started with Matrix

Getting Started with Matrix

6
Comments
4 min read
JWT, access token, and refresh token

JWT, access token, and refresh token

7
Comments
3 min read
WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

7
Comments 1
1 min read
Protecting APIs with custom headers in CloudFront

Protecting APIs with custom headers in CloudFront

19
Comments 2
6 min read
OverTheWire Natas Levels 0-11 Thinking Out Loud

OverTheWire Natas Levels 0-11 Thinking Out Loud

7
Comments
10 min read
Best Practices for Securing Your Vulnerable REST APIs

Best Practices for Securing Your Vulnerable REST APIs

9
Comments
1 min read
How do you Integrate Emissary Ingress with OPA

How do you Integrate Emissary Ingress with OPA

6
Comments
7 min read
Handling Sensitive Data: A Primer

Handling Sensitive Data: A Primer

20
Comments
6 min read
Keyoxide Proof

Keyoxide Proof

4
Comments
1 min read
How to detect your leaking API endpoints using EthicalCheck

How to detect your leaking API endpoints using EthicalCheck

4
Comments
1 min read
CherryBomb: So what's new??

CherryBomb: So what's new??

15
Comments
2 min read
Revoking Access with a JWT Blacklist/Deny List

Revoking Access with a JWT Blacklist/Deny List

4
Comments
8 min read
How to security scan your web API for vulnerabilities

How to security scan your web API for vulnerabilities

11
Comments
2 min read
What is HTTPS?

What is HTTPS?

10
Comments
4 min read
5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

3
Comments 1
3 min read
How to install Kyverno in a k8s cluster?

How to install Kyverno in a k8s cluster?

12
Comments
1 min read
10 tips for volunteering devs from data security engineers

10 tips for volunteering devs from data security engineers

10
Comments 1
3 min read
⚖ Bench (and choose) Java-8 docker images with anchore/grype

⚖ Bench (and choose) Java-8 docker images with anchore/grype

7
Comments 3
4 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

69
Comments 3
3 min read
Anubis - Python Obfuscator

Anubis - Python Obfuscator

11
Comments
2 min read
4 reasons to avoid using `npm link`

4 reasons to avoid using `npm link`

6
Comments
8 min read
So you think your password is strong

So you think your password is strong

56
Comments 21
2 min read
Service-to-Service Authorization: Non-User Principles

Service-to-Service Authorization: Non-User Principles

5
Comments
8 min read
Handle Sensitive Data Securely with Skyflow

Handle Sensitive Data Securely with Skyflow

9
Comments
6 min read
Is the open-source community ready for protestware ?

Is the open-source community ready for protestware ?

3
Comments
5 min read
PostgreSQL 14: TLS Connection

PostgreSQL 14: TLS Connection

6
Comments
3 min read
13 ways to secure your react.js application

13 ways to secure your react.js application

10
Comments
6 min read
Taking the Pain Out of Securing Your Code: A Native, Automated Approach

Taking the Pain Out of Securing Your Code: A Native, Automated Approach

28
Comments
2 min read
3 ways to make iptables persistent

3 ways to make iptables persistent

8
Comments
2 min read
Main Principles of Security in AWS Cloud

Main Principles of Security in AWS Cloud

8
Comments
2 min read
All you need to know about writing Least Privilege IAM Policies

All you need to know about writing Least Privilege IAM Policies

6
Comments
2 min read
All you need to know about AWS Identity and Access Management (IAM)

All you need to know about AWS Identity and Access Management (IAM)

6
Comments
2 min read
Helpot ohjeet salasanamanagerin kÀyttöön

Helpot ohjeet salasanamanagerin kÀyttöön

4
Comments 1
4 min read
Kyverno - Kubernetes native policy management for k8s admins

Kyverno - Kubernetes native policy management for k8s admins

24
Comments
2 min read
Signing requests to AWS services using axios

Signing requests to AWS services using axios

24
Comments 2
5 min read
Defensive Coding Reloaded: A Guide To Active Web Application Defence

Defensive Coding Reloaded: A Guide To Active Web Application Defence

10
Comments
2 min read
Security Pillar - Best Practice Areas

Security Pillar - Best Practice Areas

3
Comments
2 min read
🔐 Authentication: Is Identity-aware Proxy enough for most use cases?

🔐 Authentication: Is Identity-aware Proxy enough for most use cases?

9
Comments 4
1 min read
Adding Two-Factor Authentication Layer To Appsmith Using TypingDNA

Adding Two-Factor Authentication Layer To Appsmith Using TypingDNA

8
Comments
25 min read
Simple instructions on how to use Password Manager - and why

Simple instructions on how to use Password Manager - and why

7
Comments
4 min read
8 Best Content Security Policies for 2022

8 Best Content Security Policies for 2022

6
Comments
6 min read
TryHackMe(THM)-Mrrobot Writeup

TryHackMe(THM)-Mrrobot Writeup

8
Comments
4 min read
AWS Well-Architected Framework - Security Pillar

AWS Well-Architected Framework - Security Pillar

4
Comments
2 min read
loading...