DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Is Java as safe as we believe?

Is Java as safe as we believe?

12
Comments
4 min read
Coding standards: what are they and why do you need them

Coding standards: what are they and why do you need them

10
Comments
6 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks

How we implemented encryption and data masking for 60+ apps in 12 weeks

13
Comments
3 min read
Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

3
Comments 1
4 min read
Storing Access Policies in Policy Files vs. in a Database

Storing Access Policies in Policy Files vs. in a Database

9
Comments
5 min read
[Parte 10] ASP.NET Core: Refresh Tokens

[Parte 10] ASP.NET Core: Refresh Tokens

25
Comments 4
14 min read
A brief Introduction to OpenAPI Specification

A brief Introduction to OpenAPI Specification

29
Comments 4
4 min read
TryHackMe(THM)-Source Writeup

TryHackMe(THM)-Source Writeup

12
Comments
2 min read
Securing Containers with Seccomp: Part 2

Securing Containers with Seccomp: Part 2

5
Comments
9 min read
Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

4
Comments
5 min read
SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

3
Comments
7 min read
What we should know in PKI

What we should know in PKI

5
Comments 2
4 min read
Setup AWS Security Hub

Setup AWS Security Hub

5
Comments
4 min read
Setup Amazon GuardDuty and understand its feature

Setup Amazon GuardDuty and understand its feature

3
Comments
3 min read
HttpInterceptor

HttpInterceptor

3
Comments
1 min read
Controlling access to Lambda Function URLs

Controlling access to Lambda Function URLs

19
Comments 2
5 min read
The 10 Commandments .NET Developers Must apply for Secure Applications

The 10 Commandments .NET Developers Must apply for Secure Applications

112
Comments 11
11 min read
Benefits Of Cloud Testing And Best Practices

Benefits Of Cloud Testing And Best Practices

5
Comments
13 min read
About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

14
Comments
9 min read
Web <=2.0 Apps/Sites are Never Safe to Use

Web <=2.0 Apps/Sites are Never Safe to Use

5
Comments 1
4 min read
Blockchain Easily Explained

Blockchain Easily Explained

5
Comments 1
2 min read
Beginner's Guide to website security testing

Beginner's Guide to website security testing

9
Comments
5 min read
WebRTC Security in Plain Language for Business People

WebRTC Security in Plain Language for Business People

5
Comments
24 min read
Insecure Deserialization For Beginners

Insecure Deserialization For Beginners

16
Comments
3 min read
C - Unsafe!

C - Unsafe!

9
Comments 4
4 min read
.NET 7 WebApp with Https in Docker, secured by Azure AD

.NET 7 WebApp with Https in Docker, secured by Azure AD

9
Comments 2
4 min read
Being a Securious Cat

Being a Securious Cat

6
Comments
3 min read
AWS IAM Access Analyzer Demystified

AWS IAM Access Analyzer Demystified

7
Comments
4 min read
Secure AWS deploys from Github Actions with OIDC

Secure AWS deploys from Github Actions with OIDC

13
Comments
14 min read
Design your own security vulnerability #1

Design your own security vulnerability #1

4
Comments
2 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
How Does Face ID or Touch ID Work? Intro to WebAuthn

How Does Face ID or Touch ID Work? Intro to WebAuthn

4
Comments
6 min read
npm-registry-firewall

npm-registry-firewall

2
Comments
4 min read
Does Java 18 finally have a better alternative to JNI?

Does Java 18 finally have a better alternative to JNI?

52
Comments 4
9 min read
Encrypting Attached EBS Volumes

Encrypting Attached EBS Volumes

10
Comments
3 min read
One of these two apple.com domains is fake

One of these two apple.com domains is fake

6
Comments 1
2 min read
How to Not Expose the Personal Data of 19,577 Canadians

How to Not Expose the Personal Data of 19,577 Canadians

9
Comments
4 min read
Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

4
Comments
4 min read
Cloud Security for Newly Disctributed Enginerring Teams

Cloud Security for Newly Disctributed Enginerring Teams

3
Comments
4 min read
How to fit DevSecOps into CI/CD Pipelines

How to fit DevSecOps into CI/CD Pipelines

9
Comments
5 min read
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

4
Comments
14 min read
How to use Azure AD Self-Service Sign Up

How to use Azure AD Self-Service Sign Up

10
Comments
3 min read
Creando Sistemas Auditables con ASP.NET Core - Parte 7: Auditoría con Audit.NET

Creando Sistemas Auditables con ASP.NET Core - Parte 7: Auditoría con Audit.NET

23
Comments 8
11 min read
Self Hostable Open Source Alternatives to Commercial products

Self Hostable Open Source Alternatives to Commercial products

41
Comments
1 min read
CORS, Preflight request and OPTIONS Method

CORS, Preflight request and OPTIONS Method

7
Comments
5 min read
IAANSEC | WannaCry Analysis Report

IAANSEC | WannaCry Analysis Report

6
Comments
7 min read
Event-Driven serverless architecture to automatically remediate security findings

Event-Driven serverless architecture to automatically remediate security findings

16
Comments
6 min read
Secure your Kubernetes secrets easily with Trousseau

Secure your Kubernetes secrets easily with Trousseau

6
Comments
2 min read
Authentication Patterns and Best Practices For SPAs

Authentication Patterns and Best Practices For SPAs

13
Comments
11 min read
Power of AWS Organization ID in controlling access to AWS resources

Power of AWS Organization ID in controlling access to AWS resources

15
Comments
4 min read
Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability

Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability

7
Comments
5 min read
What is Cybersecurity? Its types, advantages and importance.

What is Cybersecurity? Its types, advantages and importance.

8
Comments
7 min read
Another cheat sheet for Dependabot

Another cheat sheet for Dependabot

15
Comments
4 min read
2FA Login Plugin Featuring TOTP

2FA Login Plugin Featuring TOTP

10
Comments
6 min read
New to Cloud or Cloud Security?

New to Cloud or Cloud Security?

4
Comments
3 min read
Autenticación y Autorización con JWT en ASP.NET Core (Parte 5)

Autenticación y Autorización con JWT en ASP.NET Core (Parte 5)

20
Comments 5
11 min read
OAuth and OIDC: What You Need To Know

OAuth and OIDC: What You Need To Know

7
Comments
11 min read
An Introduction to PCI Compliance

An Introduction to PCI Compliance

13
Comments 1
7 min read
🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)

🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)

5
Comments 2
2 min read
loading...