DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Detection of Malicious Content in Files Uploaded to S3 Bucket

Detection of Malicious Content in Files Uploaded to S3 Bucket

8
Comments
8 min read
Finding and Fixing Cloud Misconfigurations with open source

Finding and Fixing Cloud Misconfigurations with open source

8
Comments
3 min read
Maybe Passwords are the Future

Maybe Passwords are the Future

3
Comments 2
6 min read
Why APIs have become a security nightmare for SMBs and enterprises

Why APIs have become a security nightmare for SMBs and enterprises

15
Comments
3 min read
GraphQL and Security implications

GraphQL and Security implications

32
Comments 2
7 min read
Improving policy readability with NotAction

Improving policy readability with NotAction

6
Comments
4 min read
🦾 Dependency management automation with Dependabot

🦾 Dependency management automation with Dependabot

5
Comments
1 min read
Operational best practices for AWS Well-Architected Framework

Operational best practices for AWS Well-Architected Framework

11
Comments
3 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
From Ghost Assets to Infrastructure Drift - Don't Get Spooked

From Ghost Assets to Infrastructure Drift - Don't Get Spooked

6
Comments
5 min read
Pesquisa sobre sistemas de informação para gerenciamento de empresas.

Pesquisa sobre sistemas de informação para gerenciamento de empresas.

8
Comments 1
1 min read
Seven Things a Cyber-Security Enthusiast Should Know

Seven Things a Cyber-Security Enthusiast Should Know

12
Comments 1
4 min read
Remember to set Cache-Control headers on your secured pages

Remember to set Cache-Control headers on your secured pages

5
Comments
2 min read
Processo de certificação ISO/IEC 27001:2013 x V360

Processo de certificação ISO/IEC 27001:2013 x V360

7
Comments
5 min read
How to Approach DevSecOps Security Automation

How to Approach DevSecOps Security Automation

5
Comments
5 min read
Why is an SSL certificate important?🔐

Why is an SSL certificate important?🔐

8
Comments
4 min read
A down-to-earth explication of the noopener noreferrer attributes

A down-to-earth explication of the noopener noreferrer attributes

16
Comments 2
4 min read
GraphQL : The new REST?

GraphQL : The new REST?

65
Comments 23
3 min read
How Courier Became SOC 2 Type 2 Compliant

How Courier Became SOC 2 Type 2 Compliant

5
Comments
5 min read
How to store login credentials, the right way in Flutter.

How to store login credentials, the right way in Flutter.

11
Comments
4 min read
Storing related secrets in Parameter Store for more efficient access

Storing related secrets in Parameter Store for more efficient access

10
Comments
3 min read
How to respond to growing supply chain security risks?

How to respond to growing supply chain security risks?

5
Comments
3 min read
Hashids en ASP.NET Core: Protegiendo tus URLs (Parte 4)

Hashids en ASP.NET Core: Protegiendo tus URLs (Parte 4)

14
Comments 1
5 min read
Lisp machine security

Lisp machine security

2
Comments
1 min read
Auto Remediation with Eventbridge, Step Functions, and the AWS SDK Integration

Auto Remediation with Eventbridge, Step Functions, and the AWS SDK Integration

14
Comments
7 min read
Security news weekly round-up - 1st April 2022

Security news weekly round-up - 1st April 2022

5
Comments
4 min read
The THREAT HUNTER of your Cloud - Amazon Detective

The THREAT HUNTER of your Cloud - Amazon Detective

8
Comments
2 min read
Go Build in the Cloud Pt2

Go Build in the Cloud Pt2

5
Comments 1
1 min read
The IAM introduction I wish I had

The IAM introduction I wish I had

93
Comments
5 min read
Discuss: package sabotage

Discuss: package sabotage

26
Comments 34
1 min read
A rundown of the biggest cyber attacks & breaches in 2021 - and what lies ahead for us

A rundown of the biggest cyber attacks & breaches in 2021 - and what lies ahead for us

8
Comments
6 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
Securing Containers with Seccomp: Part 1

Securing Containers with Seccomp: Part 1

6
Comments
7 min read
Using kubectl to Restart a Kubernetes Pod

Using kubectl to Restart a Kubernetes Pod

8
Comments
4 min read
What even is an Open Source Program Office - with Spotify, Aiven & Wipro

What even is an Open Source Program Office - with Spotify, Aiven & Wipro

15
Comments 2
7 min read
Spring Remote Code Execution Vulnerability

Spring Remote Code Execution Vulnerability

12
Comments
1 min read
The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

10
Comments 4
10 min read
DEPLOY CONTRACTS WITH OPENZEPPELIN DEFENDER RELAYER

DEPLOY CONTRACTS WITH OPENZEPPELIN DEFENDER RELAYER

12
Comments
3 min read
Your inbox is not a digital safe

Your inbox is not a digital safe

54
Comments 6
3 min read
Getting Started with GraphQL Security

Getting Started with GraphQL Security

7
Comments 1
8 min read
Data Recovery Software For RAW File System

Data Recovery Software For RAW File System

3
Comments
9 min read
Cyber-Security and the Game Theory.

Cyber-Security and the Game Theory.

6
Comments
5 min read
Simulating a Phishing Attack Against Your Company

Simulating a Phishing Attack Against Your Company

5
Comments
3 min read
Centralising audit, compliance and incident detection

Centralising audit, compliance and incident detection

22
Comments
13 min read
Building a Transport Protocol on ARP

Building a Transport Protocol on ARP

6
Comments
8 min read
How to avoid AWS Cloud Security Mistakes

How to avoid AWS Cloud Security Mistakes

4
Comments
4 min read
The Psychology Behind Late-Stage Software Testing

The Psychology Behind Late-Stage Software Testing

5
Comments 2
6 min read
Introduction aux enquêtes basées sur l'OSINT

Introduction aux enquêtes basées sur l'OSINT

6
Comments
3 min read
AWS IoT - Securing Your Connected Devices, Connections, and Data

AWS IoT - Securing Your Connected Devices, Connections, and Data

10
Comments
2 min read
What is browser fingerprinting and why should you integrate with your website?

What is browser fingerprinting and why should you integrate with your website?

7
Comments
3 min read
RBAC, ABAC and CapBAC in IoT

RBAC, ABAC and CapBAC in IoT

13
Comments
2 min read
How to password protect any website?

How to password protect any website?

12
Comments
2 min read
Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

10
Comments
14 min read
Is your robots.txt file vulnerable? Here's how to check and secure it

Is your robots.txt file vulnerable? Here's how to check and secure it

6
Comments
3 min read
Automating Prowler for Compliance Checking in AWS

Automating Prowler for Compliance Checking in AWS

11
Comments 1
5 min read
Understanding password storage

Understanding password storage

28
Comments
4 min read
Bug Bounty: Not always an ideal

Bug Bounty: Not always an ideal

29
Comments 4
2 min read
Garder le Dependabot sous contrôle

Garder le Dependabot sous contrôle

6
Comments
5 min read
Restric Access to Cloudfront Distribution using Lambda@Edge

Restric Access to Cloudfront Distribution using Lambda@Edge

19
Comments 3
2 min read
The pillars of a “good”, that lead us to eventual great software and products.

The pillars of a “good”, that lead us to eventual great software and products.

7
Comments
6 min read
loading...