DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Beginner's Guide to Application Security

A Beginner's Guide to Application Security

5
Comments 3
6 min read
How to deploy SuperTokens with React and NodeJS on Vercel

How to deploy SuperTokens with React and NodeJS on Vercel

10
Comments
3 min read
Controlling access in service-to-service communications with Cognito - Part 1

Controlling access in service-to-service communications with Cognito - Part 1

21
Comments
6 min read
Shortcut for AWS CDK credentials: insanely simple setup for SSO, SAML, and named profiles

Shortcut for AWS CDK credentials: insanely simple setup for SSO, SAML, and named profiles

18
Comments
6 min read
Logging SSH and Session activity using AWS Systems Manager

Logging SSH and Session activity using AWS Systems Manager

16
Comments
5 min read
Encrypting Folders on MacOS

Encrypting Folders on MacOS

3
Comments
1 min read
Secure TCP tunnel from anywhere with curl and nc for single connection

Secure TCP tunnel from anywhere with curl and nc for single connection

16
Comments
14 min read
Passwordless face login with Entry in the React app

Passwordless face login with Entry in the React app

7
Comments
3 min read
Getting started developing Falco

Getting started developing Falco

5
Comments
8 min read
Support Tips #1 - Digital Security Basics

Support Tips #1 - Digital Security Basics

4
Comments
9 min read
Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

Hey guys! If you're looking to get feedback on your API security, drop a link here 👇 I Would love to help.

4
Comments 1
1 min read
Distroless Alpine

Distroless Alpine

12
Comments 1
3 min read
Running Basic Security Tests Against Twitter API

Running Basic Security Tests Against Twitter API

4
Comments
1 min read
Understanding the Shared Responsibility Model in AWS

Understanding the Shared Responsibility Model in AWS

8
Comments
4 min read
What is AWS Detective?

What is AWS Detective?

5
Comments
2 min read
🎞️ This is how we maintain & release Secured Software on Github 🤖

🎞️ This is how we maintain & release Secured Software on Github 🤖

4
Comments
2 min read
Build a discoverable change password form

Build a discoverable change password form

12
Comments
1 min read
1Password for SSH changed the way I work

1Password for SSH changed the way I work

9
Comments
3 min read
Insomni’Hack : un résumé des confs que nous avons vu

Insomni’Hack : un résumé des confs que nous avons vu

4
Comments
3 min read
How I scanned dev.to APIs for vulnerabilities

How I scanned dev.to APIs for vulnerabilities

32
Comments 3
1 min read
CloudFront Standing In the Front

CloudFront Standing In the Front

15
Comments
4 min read
How to spot poor implementations of 2FA

How to spot poor implementations of 2FA

10
Comments
2 min read
Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

Threat Detection on EKS – Comparing Falco and GuardDuty For EKS Protection

9
Comments
8 min read
Kubernetes least privilege implementation using the Google Cloud as an example

Kubernetes least privilege implementation using the Google Cloud as an example

9
Comments
7 min read
Lets talk a bit about ISO/IEC 27001

Lets talk a bit about ISO/IEC 27001

10
Comments 1
5 min read
Controlling access to the API with Lambda authorizers

Controlling access to the API with Lambda authorizers

12
Comments
6 min read
From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

From Uni to Junior Security Analyst: My journey at DCSL GuideSmiths

5
Comments
4 min read
Role of a SecOps Center, SecOps team, & SecOps with AI

Role of a SecOps Center, SecOps team, & SecOps with AI

7
Comments
3 min read
AWS is only as safe as the weakest credentials setup for your developers.

AWS is only as safe as the weakest credentials setup for your developers.

13
Comments
10 min read
No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

No More VPN! Securely Connect to Private Resources with Twingate [Step-by-Step]

9
Comments 1
7 min read
Ohjelmistokehittäjästä eettiseksi hakkeriksi

Ohjelmistokehittäjästä eettiseksi hakkeriksi

3
Comments
2 min read
What is SecOps and Its Benefits

What is SecOps and Its Benefits

5
Comments
3 min read
Enarx: The future of Trusted Execution Environment Frameworks

Enarx: The future of Trusted Execution Environment Frameworks

11
Comments
3 min read
https

https

6
Comments
4 min read
Little step to use PKI easiest

Little step to use PKI easiest

10
Comments
7 min read
Getting Started with Matrix

Getting Started with Matrix

6
Comments
4 min read
JWT, access token, and refresh token

JWT, access token, and refresh token

7
Comments
3 min read
WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

WHY YOU SHOULD JOIN THE AWS COMMUNITY BUILDERS PROGRAM

7
Comments 1
1 min read
Protecting APIs with custom headers in CloudFront

Protecting APIs with custom headers in CloudFront

19
Comments 2
6 min read
OverTheWire Natas Levels 0-11 Thinking Out Loud

OverTheWire Natas Levels 0-11 Thinking Out Loud

7
Comments
10 min read
Best Practices for Securing Your Vulnerable REST APIs

Best Practices for Securing Your Vulnerable REST APIs

9
Comments
1 min read
How do you Integrate Emissary Ingress with OPA

How do you Integrate Emissary Ingress with OPA

6
Comments
7 min read
Handling Sensitive Data: A Primer

Handling Sensitive Data: A Primer

20
Comments
6 min read
Keyoxide Proof

Keyoxide Proof

4
Comments
1 min read
How to detect your leaking API endpoints using EthicalCheck

How to detect your leaking API endpoints using EthicalCheck

4
Comments
1 min read
CherryBomb: So what's new??

CherryBomb: So what's new??

15
Comments
2 min read
Revoking Access with a JWT Blacklist/Deny List

Revoking Access with a JWT Blacklist/Deny List

4
Comments
8 min read
How to security scan your web API for vulnerabilities

How to security scan your web API for vulnerabilities

11
Comments
2 min read
What is HTTPS?

What is HTTPS?

10
Comments
4 min read
5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

3
Comments 1
3 min read
How to install Kyverno in a k8s cluster?

How to install Kyverno in a k8s cluster?

12
Comments
1 min read
10 tips for volunteering devs from data security engineers

10 tips for volunteering devs from data security engineers

10
Comments 1
3 min read
⚖️ Bench (and choose) Java-8 docker images with anchore/grype

⚖️ Bench (and choose) Java-8 docker images with anchore/grype

7
Comments 3
4 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

69
Comments 3
3 min read
Anubis - Python Obfuscator

Anubis - Python Obfuscator

12
Comments
2 min read
4 reasons to avoid using `npm link`

4 reasons to avoid using `npm link`

6
Comments
8 min read
So you think your password is strong

So you think your password is strong

56
Comments 21
2 min read
Service-to-Service Authorization: Non-User Principles

Service-to-Service Authorization: Non-User Principles

5
Comments
8 min read
Handle Sensitive Data Securely with Skyflow

Handle Sensitive Data Securely with Skyflow

9
Comments
6 min read
Is the open-source community ready for protestware ?

Is the open-source community ready for protestware ?

3
Comments
5 min read
loading...