DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to install the new security updates for Adobe Commerce APSB22-12

How to install the new security updates for Adobe Commerce APSB22-12

4
Comments
3 min read
10 best practices to secure your AWS environment

10 best practices to secure your AWS environment

11
Comments
6 min read
Understand Django: Security and Django

Understand Django: Security and Django

6
Comments
10 min read
Easiest way to create secure and random strings for your JWT, session and cookie secrets.

Easiest way to create secure and random strings for your JWT, session and cookie secrets.

8
Comments
1 min read
Minimum Viable Security – Start Small, Then Iterate with David Melamed

Minimum Viable Security – Start Small, Then Iterate with David Melamed

5
Comments
24 min read
CSRF Protection in Next.js

CSRF Protection in Next.js

15
Comments 10
2 min read
What Is Cryptography? And How to Encrypt Data in Postman

What Is Cryptography? And How to Encrypt Data in Postman

8
Comments
5 min read
Lava lamps securing the Web?đŸ€·â€â™‚ïž

Lava lamps securing the Web?đŸ€·â€â™‚ïž

5
Comments
1 min read
What is Peer-to-Peer(P2P) Network?

What is Peer-to-Peer(P2P) Network?

2
Comments
1 min read
Terraform - Place your EC2 instance in a private subnet

Terraform - Place your EC2 instance in a private subnet

7
Comments
4 min read
Spring Security without the WebSecurityConfigurerAdapter

Spring Security without the WebSecurityConfigurerAdapter

7
Comments
1 min read
Aplikasi sadap whatsapp

Aplikasi sadap whatsapp

2
Comments 1
3 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
OpenBSD acme-client For Let's Encrypt Certificates

OpenBSD acme-client For Let's Encrypt Certificates

5
Comments
5 min read
How to Add a Social Login to Your Website with SuperTokens (Custom UI Only)

How to Add a Social Login to Your Website with SuperTokens (Custom UI Only)

5
Comments
4 min read
A Gentle Introduction to SAML Authentication

A Gentle Introduction to SAML Authentication

30
Comments 1
11 min read
Azure Functions, Azure AD B2C and Python

Azure Functions, Azure AD B2C and Python

8
Comments
4 min read
Detecting, Investigating and Verifying Fixes for Security Incidents and Zero Day Issues Using Lightrun

Detecting, Investigating and Verifying Fixes for Security Incidents and Zero Day Issues Using Lightrun

13
Comments
6 min read
DevSecOps tool examples that will make your life easier

DevSecOps tool examples that will make your life easier

3
Comments
4 min read
Create a multi-tenancy application in Nest.js Part 4 (Authentication and Authorization setup)

Create a multi-tenancy application in Nest.js Part 4 (Authentication and Authorization setup)

14
Comments 1
11 min read
Secure your API Gateway APIs with Lambda Authorizer

Secure your API Gateway APIs with Lambda Authorizer

35
Comments 2
7 min read
If you build it, you should break it

If you build it, you should break it

3
Comments
2 min read
NestJS Payload Validation

NestJS Payload Validation

7
Comments
4 min read
Secure Wordpress Website

Secure Wordpress Website

16
Comments 1
4 min read
Introduction to cloud misconfigurations

Introduction to cloud misconfigurations

16
Comments
4 min read
4 Misconceptions about Biometrics

4 Misconceptions about Biometrics

11
Comments
4 min read
An SSO primer: what is it, and how does it work?

An SSO primer: what is it, and how does it work?

7
Comments
5 min read
đŸ‘źđŸœAmazon Inspector - Automated and Continual vulnerability management at scale

đŸ‘źđŸœAmazon Inspector - Automated and Continual vulnerability management at scale

7
Comments
3 min read
Automating your CloudQuery Policies with CircleCI

Automating your CloudQuery Policies with CircleCI

8
Comments
6 min read
Raising the Bar on Security by Purging Credentials From the Cloud

Raising the Bar on Security by Purging Credentials From the Cloud

2
Comments 1
7 min read
Delegating control with an advanced multi-tenant setup in Kubernetes

Delegating control with an advanced multi-tenant setup in Kubernetes

2
Comments
5 min read
SSO without Standards: Simple Yet Secure Authentication in Legacy Systems

SSO without Standards: Simple Yet Secure Authentication in Legacy Systems

2
Comments
4 min read
Sign Your Container Images with Cosign, GitHub Actions and GitHub Container Registry

Sign Your Container Images with Cosign, GitHub Actions and GitHub Container Registry

14
Comments 2
9 min read
Cloud Governance For The DevOps Pro

Cloud Governance For The DevOps Pro

2
Comments
3 min read
HashiConf Europe returns to Amsterdam June 20-22

HashiConf Europe returns to Amsterdam June 20-22

5
Comments
1 min read
Policies in NodeJS - Part 1

Policies in NodeJS - Part 1

17
Comments 1
5 min read
Running AWS Foundational Security Best Practices with CloudQuery Policies

Running AWS Foundational Security Best Practices with CloudQuery Policies

5
Comments
2 min read
What is ModSecurity? Installation Guide for Apache on Ubuntu

What is ModSecurity? Installation Guide for Apache on Ubuntu

3
Comments
1 min read
Spring Security. Managing users

Spring Security. Managing users

7
Comments
4 min read
What is the difference between encryption, hashing and salting?

What is the difference between encryption, hashing and salting?

31
Comments 4
6 min read
Adding Custom Domains to your SaaS

Adding Custom Domains to your SaaS

31
Comments 15
7 min read
Dynamic JWT authentication and secrets rotation in Rails Applications

Dynamic JWT authentication and secrets rotation in Rails Applications

10
Comments
3 min read
Why are we organizing a tech conference called SRE NEXT 2022?

Why are we organizing a tech conference called SRE NEXT 2022?

7
Comments
4 min read
Read-only buckets in shared AWS accounts

Read-only buckets in shared AWS accounts

5
Comments
6 min read
Protegendo a comunicação do Flutter com o Couchbase

Protegendo a comunicação do Flutter com o Couchbase

10
Comments
12 min read
Using hardware tokens for two-factor authentication: how does it work?

Using hardware tokens for two-factor authentication: how does it work?

15
Comments 1
8 min read
How to pass Certified Cloud Security Professional (CCSP) Exam?

How to pass Certified Cloud Security Professional (CCSP) Exam?

4
Comments
1 min read
Three steps to better account security

Three steps to better account security

37
Comments
3 min read
Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)

Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)

5
Comments
9 min read
Magic Link Login: Simple, Easy and Secure

Magic Link Login: Simple, Easy and Secure

11
Comments
5 min read
🚔 Policing with Amazon Macie - Security & Compliance

🚔 Policing with Amazon Macie - Security & Compliance

9
Comments 3
3 min read
«Avira» Antivirus Removed Files by Mistake – How to Recover Them?

«Avira» Antivirus Removed Files by Mistake – How to Recover Them?

2
Comments
5 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Content Security Policy with PHP

Content Security Policy with PHP

8
Comments
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io

Creating an end-to-end encrypted chat with GetStream.io and seald.io

15
Comments
8 min read
How to remove Nginx server version and name.

How to remove Nginx server version and name.

13
Comments
3 min read
PwnKit, or how 12-year-old code can give root to unprivileged users

PwnKit, or how 12-year-old code can give root to unprivileged users

6
Comments
3 min read
How to remove files safely from an HDD or SSD in Windows 10

How to remove files safely from an HDD or SSD in Windows 10

5
Comments
6 min read
How to Mitigate IoT Security Threats in 2022

How to Mitigate IoT Security Threats in 2022

9
Comments
6 min read
Creating a simple REST API in Deno

Creating a simple REST API in Deno

7
Comments
8 min read
loading...