DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Go build in the Cloud 1

Go build in the Cloud 1

8
Comments
1 min read
From Software Developer to Ethical Hacker

From Software Developer to Ethical Hacker

19
Comments 1
3 min read
How do you stop a persistent process listening on port 53?

How do you stop a persistent process listening on port 53?

2
Comments
21 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Asymmetric Encryption In PHP

Asymmetric Encryption In PHP

10
Comments 1
2 min read
SSH: the "Too many authentication failures" error and its solution

SSH: the "Too many authentication failures" error and its solution

3
Comments 1
3 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

13
Comments 3
2 min read
Using Layer0’s EdgeJS to Configure Custom Security Headers

Using Layer0’s EdgeJS to Configure Custom Security Headers

5
Comments
6 min read
Attribute-based access control in AWS

Attribute-based access control in AWS

8
Comments
6 min read
The 'S' in IoT stands for security

The 'S' in IoT stands for security

8
Comments
3 min read
nrich - Find Open ports, vulnerabilities quickly

nrich - Find Open ports, vulnerabilities quickly

6
Comments
1 min read
How to Backup Locally a Remote Mysql Database on Linux

How to Backup Locally a Remote Mysql Database on Linux

10
Comments
3 min read
Get started with Lambda Authorizers

Get started with Lambda Authorizers

24
Comments
4 min read
High Stakes and High Stacks with Or Weis

High Stakes and High Stacks with Or Weis

4
Comments
30 min read
Designing an Authorization Model for an Enterprise

Designing an Authorization Model for an Enterprise

6
Comments 1
9 min read
Understanding Context-Aware Permissions

Understanding Context-Aware Permissions

5
Comments
7 min read
Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing

Kubernetes Hardening Tutorial Part 3: Authn, Authz, Logging & Auditing

11
Comments
10 min read
Basic Recon Automation Using Github Actions

Basic Recon Automation Using Github Actions

6
Comments
7 min read
Automação básica de Recon utilizando o Github Actions

Automação básica de Recon utilizando o Github Actions

5
Comments
8 min read
How to Secure Amazon EC2 Instances

How to Secure Amazon EC2 Instances

12
Comments
6 min read
Kali Sweet theme

Kali Sweet theme

8
Comments
1 min read
NestJS Custom Payload Validation

NestJS Custom Payload Validation

9
Comments
3 min read
An Introduction to OPA

An Introduction to OPA

6
Comments 1
7 min read
npm install actual-malware

npm install actual-malware

16
Comments 1
4 min read
Connecting Secure Socket Shell (ssh)🤫 to GitHub

Connecting Secure Socket Shell (ssh)🤫 to GitHub

5
Comments
2 min read
Boas práticas de segurança em sites React

Boas práticas de segurança em sites React

9
Comments 1
3 min read
Authentication Cookies HTTP, HTTP Only, JWT, ReactJs Context API and Node on Backend Industry Structure

Authentication Cookies HTTP, HTTP Only, JWT, ReactJs Context API and Node on Backend Industry Structure

40
Comments
7 min read
Security for React Apps

Security for React Apps

8
Comments 1
3 min read
Check and secure CDK code with cdk-nag

Check and secure CDK code with cdk-nag

7
Comments
7 min read
AWS Security Hub-Visualize Security Hub Finding and other Security Data

AWS Security Hub-Visualize Security Hub Finding and other Security Data

5
Comments
3 min read
SonarQube Analysis with Community Edition in a Docker Container on Mac M1

SonarQube Analysis with Community Edition in a Docker Container on Mac M1

7
Comments 1
1 min read
Spring Boot: Prevent Log Injection Attacks With Logback

Spring Boot: Prevent Log Injection Attacks With Logback

5
Comments
4 min read
11 Security tips to protect your website

11 Security tips to protect your website

133
Comments 11
6 min read
Threat Modelling Simplified

Threat Modelling Simplified

2
Comments
2 min read
Security news weekly round-up - 11th March 2022

Security news weekly round-up - 11th March 2022

6
Comments
4 min read
The Essential PCI Compliance Checklist

The Essential PCI Compliance Checklist

3
Comments 1
7 min read
Top 15 Best GRC (Governance, Risk, and Compliance) Tools

Top 15 Best GRC (Governance, Risk, and Compliance) Tools

3
Comments
9 min read
How 2FA, and other security features work to protect your account

How 2FA, and other security features work to protect your account

2
Comments
3 min read
Integrate Gitlab with Google Cloud workload identity federation

Integrate Gitlab with Google Cloud workload identity federation

3
Comments
4 min read
What is cross-site scripting (XSS) and how does it work?

What is cross-site scripting (XSS) and how does it work?

18
Comments
7 min read
How can you create more secure applications?

How can you create more secure applications?

3
Comments
5 min read
How to install the new security updates for Adobe Commerce APSB22-12

How to install the new security updates for Adobe Commerce APSB22-12

4
Comments
3 min read
10 best practices to secure your AWS environment

10 best practices to secure your AWS environment

11
Comments
6 min read
Understand Django: Security and Django

Understand Django: Security and Django

6
Comments
10 min read
Easiest way to create secure and random strings for your JWT, session and cookie secrets.

Easiest way to create secure and random strings for your JWT, session and cookie secrets.

8
Comments
1 min read
Minimum Viable Security – Start Small, Then Iterate with David Melamed

Minimum Viable Security – Start Small, Then Iterate with David Melamed

5
Comments
24 min read
CSRF Protection in Next.js

CSRF Protection in Next.js

15
Comments 10
2 min read
What Is Cryptography? And How to Encrypt Data in Postman

What Is Cryptography? And How to Encrypt Data in Postman

8
Comments
5 min read
Lava lamps securing the Web?🤷‍♂️

Lava lamps securing the Web?🤷‍♂️

5
Comments
1 min read
Terraform - Place your EC2 instance in a private subnet

Terraform - Place your EC2 instance in a private subnet

7
Comments
4 min read
What is Peer-to-Peer(P2P) Network?

What is Peer-to-Peer(P2P) Network?

2
Comments
1 min read
Spring Security without the WebSecurityConfigurerAdapter

Spring Security without the WebSecurityConfigurerAdapter

7
Comments
1 min read
Aplikasi sadap whatsapp

Aplikasi sadap whatsapp

2
Comments 1
3 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

4
Comments
2 min read
OpenBSD acme-client For Let's Encrypt Certificates

OpenBSD acme-client For Let's Encrypt Certificates

5
Comments
5 min read
How to Add a Social Login to Your Website with SuperTokens (Custom UI Only)

How to Add a Social Login to Your Website with SuperTokens (Custom UI Only)

5
Comments
4 min read
A Gentle Introduction to SAML Authentication

A Gentle Introduction to SAML Authentication

30
Comments 1
11 min read
Azure Functions, Azure AD B2C and Python

Azure Functions, Azure AD B2C and Python

8
Comments
4 min read
Detecting, Investigating and Verifying Fixes for Security Incidents and Zero Day Issues Using Lightrun

Detecting, Investigating and Verifying Fixes for Security Incidents and Zero Day Issues Using Lightrun

13
Comments
6 min read
DevSecOps tool examples that will make your life easier

DevSecOps tool examples that will make your life easier

3
Comments
4 min read
loading...