DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to read encoded authorization error messages in AWS

How to read encoded authorization error messages in AWS

10
Comments
4 min read
Securing your Load Balancer with CloudFront

Securing your Load Balancer with CloudFront

16
Comments
2 min read
OverTheWire Bandit Levels 19-34 Hints and Notes

OverTheWire Bandit Levels 19-34 Hints and Notes

6
Comments
12 min read
User Office Hours: Building a Secure CI/CD Pipeline with GitHub Actions and Snyk

User Office Hours: Building a Secure CI/CD Pipeline with GitHub Actions and Snyk

6
Comments
1 min read
Setting up a multi-account AWS environment

Setting up a multi-account AWS environment

38
Comments
8 min read
Adding AWS SSO and controlling permissions

Adding AWS SSO and controlling permissions

19
Comments 3
11 min read
AWS VPC with AWS VPN Client vs. OpenVPN Access Server

AWS VPC with AWS VPN Client vs. OpenVPN Access Server

10
Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Protect your Amazon CloudFront content — Authorization@Edge using cookies

Protect your Amazon CloudFront content — Authorization@Edge using cookies

7
Comments
2 min read
Why Safe Programming Matters and Why a Language Like Rust Matters

Why Safe Programming Matters and Why a Language Like Rust Matters

56
Comments 6
10 min read
Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
Website Security Tips

Website Security Tips

10
Comments
4 min read
Hashes are surprisingly fun

Hashes are surprisingly fun

3
Comments 1
3 min read
Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist

Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist

5
Comments
7 min read
Incident Response on AWS

Incident Response on AWS

13
Comments
5 min read
Shisho Cloud evolved into a more sophisticated and developer-friendly security tool

Shisho Cloud evolved into a more sophisticated and developer-friendly security tool

5
Comments
3 min read
A Step-by-step Guide to Preventing Tailgating Attacks

A Step-by-step Guide to Preventing Tailgating Attacks

5
Comments
6 min read
Deploying IAC with your secrets in Terraform Vault

Deploying IAC with your secrets in Terraform Vault

18
Comments
3 min read
Is it worthwhile to upgrade from Slack's free plan to the paid one?

Is it worthwhile to upgrade from Slack's free plan to the paid one?

5
Comments
4 min read
Go build in the Cloud 1

Go build in the Cloud 1

8
Comments
1 min read
From Software Developer to Ethical Hacker

From Software Developer to Ethical Hacker

19
Comments 1
3 min read
How do you stop a persistent process listening on port 53?

How do you stop a persistent process listening on port 53?

2
Comments
21 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Asymmetric Encryption In PHP

Asymmetric Encryption In PHP

10
Comments 1
2 min read
SSH: the "Too many authentication failures" error and its solution

SSH: the "Too many authentication failures" error and its solution

3
Comments 1
3 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

13
Comments 3
2 min read
Using Layer0’s EdgeJS to Configure Custom Security Headers

Using Layer0’s EdgeJS to Configure Custom Security Headers

5
Comments
6 min read
Attribute-based access control in AWS

Attribute-based access control in AWS

8
Comments
6 min read
The 'S' in IoT stands for security

The 'S' in IoT stands for security

8
Comments
3 min read
nrich - Find Open ports, vulnerabilities quickly

nrich - Find Open ports, vulnerabilities quickly

6
Comments
1 min read
How to Backup Locally a Remote Mysql Database on Linux

How to Backup Locally a Remote Mysql Database on Linux

10
Comments
3 min read
Get started with Lambda Authorizers

Get started with Lambda Authorizers

24
Comments
4 min read
High Stakes and High Stacks with Or Weis

High Stakes and High Stacks with Or Weis

4
Comments
30 min read
Designing an Authorization Model for an Enterprise

Designing an Authorization Model for an Enterprise

6
Comments 1
9 min read
Understanding Context-Aware Permissions

Understanding Context-Aware Permissions

5
Comments
7 min read
Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing

Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing

11
Comments
10 min read
Basic Recon Automation Using Github Actions

Basic Recon Automation Using Github Actions

6
Comments
7 min read
Automação básica de Recon utilizando o Github Actions

Automação básica de Recon utilizando o Github Actions

5
Comments
8 min read
How to Secure Amazon EC2 Instances

How to Secure Amazon EC2 Instances

12
Comments
6 min read
Kali Sweet theme

Kali Sweet theme

8
Comments
1 min read
NestJS Custom Payload Validation

NestJS Custom Payload Validation

9
Comments
3 min read
An Introduction to OPA

An Introduction to OPA

6
Comments 1
7 min read
npm install actual-malware

npm install actual-malware

16
Comments 1
4 min read
Connecting Secure Socket Shell (ssh)🤫 to GitHub

Connecting Secure Socket Shell (ssh)🤫 to GitHub

5
Comments
2 min read
Boas práticas de segurança em sites React

Boas práticas de segurança em sites React

9
Comments 1
3 min read
Authentication Cookies HTTP, HTTP Only, JWT, ReactJs Context API and Node on Backend Industry Structure

Authentication Cookies HTTP, HTTP Only, JWT, ReactJs Context API and Node on Backend Industry Structure

40
Comments
7 min read
Security for React Apps

Security for React Apps

8
Comments 1
3 min read
Check and secure CDK code with cdk-nag

Check and secure CDK code with cdk-nag

7
Comments
7 min read
AWS Security Hub-Visualize Security Hub Finding and other Security Data

AWS Security Hub-Visualize Security Hub Finding and other Security Data

5
Comments
3 min read
SonarQube Analysis with Community Edition in a Docker Container on Mac M1

SonarQube Analysis with Community Edition in a Docker Container on Mac M1

7
Comments 1
1 min read
Spring Boot: Prevent Log Injection Attacks With Logback

Spring Boot: Prevent Log Injection Attacks With Logback

5
Comments
4 min read
11 Security tips to protect your website

11 Security tips to protect your website

133
Comments 11
6 min read
Threat Modelling Simplified

Threat Modelling Simplified

2
Comments
2 min read
Security news weekly round-up - 11th March 2022

Security news weekly round-up - 11th March 2022

6
Comments
4 min read
The Essential PCI Compliance Checklist

The Essential PCI Compliance Checklist

3
Comments 1
7 min read
Top 15 Best GRC (Governance, Risk, and Compliance) Tools

Top 15 Best GRC (Governance, Risk, and Compliance) Tools

3
Comments
9 min read
How 2FA, and other security features work to protect your account

How 2FA, and other security features work to protect your account

2
Comments
3 min read
Integrate Gitlab with Google Cloud workload identity federation

Integrate Gitlab with Google Cloud workload identity federation

3
Comments
4 min read
What is cross-site scripting (XSS) and how does it work?

What is cross-site scripting (XSS) and how does it work?

18
Comments
7 min read
How can you create more secure applications?

How can you create more secure applications?

3
Comments
5 min read
loading...