DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
Securing Containers with Seccomp: Part 1

Securing Containers with Seccomp: Part 1

6
Comments
7 min read
Using kubectl to Restart a Kubernetes Pod

Using kubectl to Restart a Kubernetes Pod

8
Comments
4 min read
What even is an Open Source Program Office - with Spotify, Aiven & Wipro

What even is an Open Source Program Office - with Spotify, Aiven & Wipro

15
Comments 2
7 min read
Spring Remote Code Execution Vulnerability

Spring Remote Code Execution Vulnerability

12
Comments
1 min read
The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

10
Comments 4
10 min read
DEPLOY CONTRACTS WITH OPENZEPPELIN DEFENDER RELAYER

DEPLOY CONTRACTS WITH OPENZEPPELIN DEFENDER RELAYER

12
Comments
3 min read
Your inbox is not a digital safe

Your inbox is not a digital safe

54
Comments 6
3 min read
Getting Started with GraphQL Security

Getting Started with GraphQL Security

7
Comments 1
8 min read
Data Recovery Software For RAW File System

Data Recovery Software For RAW File System

3
Comments
9 min read
Cyber-Security and the Game Theory.

Cyber-Security and the Game Theory.

6
Comments
5 min read
Simulating a Phishing Attack Against Your Company

Simulating a Phishing Attack Against Your Company

5
Comments
3 min read
Centralising audit, compliance and incident detection

Centralising audit, compliance and incident detection

22
Comments
13 min read
Building a Transport Protocol on ARP

Building a Transport Protocol on ARP

6
Comments
8 min read
How to avoid AWS Cloud Security Mistakes

How to avoid AWS Cloud Security Mistakes

4
Comments
4 min read
The Psychology Behind Late-Stage Software Testing

The Psychology Behind Late-Stage Software Testing

5
Comments 2
6 min read
Introduction aux enquêtes basées sur l'OSINT

Introduction aux enquêtes basées sur l'OSINT

6
Comments
3 min read
AWS IoT - Securing Your Connected Devices, Connections, and Data

AWS IoT - Securing Your Connected Devices, Connections, and Data

10
Comments
2 min read
What is browser fingerprinting and why should you integrate with your website?

What is browser fingerprinting and why should you integrate with your website?

7
Comments
3 min read
RBAC, ABAC and CapBAC in IoT

RBAC, ABAC and CapBAC in IoT

13
Comments
2 min read
How to password protect any website?

How to password protect any website?

12
Comments
2 min read
Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

10
Comments
14 min read
Is your robots.txt file vulnerable? Here's how to check and secure it

Is your robots.txt file vulnerable? Here's how to check and secure it

6
Comments
3 min read
Automating Prowler for Compliance Checking in AWS

Automating Prowler for Compliance Checking in AWS

11
Comments 1
5 min read
Understanding password storage

Understanding password storage

28
Comments
4 min read
Bug Bounty: Not always an ideal

Bug Bounty: Not always an ideal

29
Comments 4
2 min read
Garder le Dependabot sous contrĂ´le

Garder le Dependabot sous contrĂ´le

6
Comments
5 min read
Restric Access to Cloudfront Distribution using Lambda@Edge

Restric Access to Cloudfront Distribution using Lambda@Edge

19
Comments 3
2 min read
The pillars of a “good”, that lead us to eventual great software and products.

The pillars of a “good”, that lead us to eventual great software and products.

7
Comments
6 min read
How to read encoded authorization error messages in AWS

How to read encoded authorization error messages in AWS

10
Comments
4 min read
Securing your Load Balancer with CloudFront

Securing your Load Balancer with CloudFront

16
Comments
2 min read
OverTheWire Bandit Levels 19-34 Hints and Notes

OverTheWire Bandit Levels 19-34 Hints and Notes

6
Comments
12 min read
User Office Hours: Building a Secure CI/CD Pipeline with GitHub Actions and Snyk

User Office Hours: Building a Secure CI/CD Pipeline with GitHub Actions and Snyk

6
Comments
1 min read
Setting up a multi-account AWS environment

Setting up a multi-account AWS environment

38
Comments
8 min read
Adding AWS SSO and controlling permissions

Adding AWS SSO and controlling permissions

20
Comments 3
11 min read
AWS VPC with AWS VPN Client vs. OpenVPN Access Server

AWS VPC with AWS VPN Client vs. OpenVPN Access Server

10
Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Protect your Amazon CloudFront content — Authorization@Edge using cookies

Protect your Amazon CloudFront content — Authorization@Edge using cookies

7
Comments
2 min read
Why Safe Programming Matters and Why a Language Like Rust Matters

Why Safe Programming Matters and Why a Language Like Rust Matters

57
Comments 6
10 min read
Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
Website Security Tips

Website Security Tips

10
Comments
4 min read
Hashes are surprisingly fun

Hashes are surprisingly fun

3
Comments 1
3 min read
Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist

Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist

5
Comments
7 min read
Incident Response on AWS

Incident Response on AWS

13
Comments
5 min read
Shisho Cloud evolved into a more sophisticated and developer-friendly security tool

Shisho Cloud evolved into a more sophisticated and developer-friendly security tool

5
Comments
3 min read
A Step-by-step Guide to Preventing Tailgating Attacks

A Step-by-step Guide to Preventing Tailgating Attacks

5
Comments
6 min read
Deploying IAC with your secrets in Terraform Vault

Deploying IAC with your secrets in Terraform Vault

18
Comments
3 min read
Is it worthwhile to upgrade from Slack's free plan to the paid one?

Is it worthwhile to upgrade from Slack's free plan to the paid one?

5
Comments
4 min read
Go build in the Cloud 1

Go build in the Cloud 1

8
Comments
1 min read
From Software Developer to Ethical Hacker

From Software Developer to Ethical Hacker

19
Comments 1
3 min read
How do you stop a persistent process listening on port 53?

How do you stop a persistent process listening on port 53?

2
Comments
21 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

4
Comments
3 min read
Asymmetric Encryption In PHP

Asymmetric Encryption In PHP

10
Comments 1
2 min read
SSH: the "Too many authentication failures" error and its solution

SSH: the "Too many authentication failures" error and its solution

3
Comments 1
3 min read
2 free data security tools every dev should know (and use)

2 free data security tools every dev should know (and use)

13
Comments 3
2 min read
Using Layer0’s EdgeJS to Configure Custom Security Headers

Using Layer0’s EdgeJS to Configure Custom Security Headers

5
Comments
6 min read
Attribute-based access control in AWS

Attribute-based access control in AWS

8
Comments
6 min read
The 'S' in IoT stands for security

The 'S' in IoT stands for security

8
Comments
3 min read
nrich - Find Open ports, vulnerabilities quickly

nrich - Find Open ports, vulnerabilities quickly

6
Comments
1 min read
How to Backup Locally a Remote Mysql Database on Linux

How to Backup Locally a Remote Mysql Database on Linux

10
Comments
3 min read
loading...