DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Best Practices for Securing Your Vulnerable REST APIs

Best Practices for Securing Your Vulnerable REST APIs

9
Comments
1 min read
How do you Integrate Emissary Ingress with OPA

How do you Integrate Emissary Ingress with OPA

6
Comments
7 min read
Handling Sensitive Data: A Primer

Handling Sensitive Data: A Primer

20
Comments
6 min read
Keyoxide Proof

Keyoxide Proof

4
Comments
1 min read
How to detect your leaking API endpoints using EthicalCheck

How to detect your leaking API endpoints using EthicalCheck

4
Comments
1 min read
CherryBomb: So what's new??

CherryBomb: So what's new??

15
Comments
2 min read
Revoking Access with a JWT Blacklist/Deny List

Revoking Access with a JWT Blacklist/Deny List

4
Comments
8 min read
How to security scan your web API for vulnerabilities

How to security scan your web API for vulnerabilities

11
Comments
2 min read
What is HTTPS?

What is HTTPS?

10
Comments
4 min read
5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

5 Tools for Analysing the Security of Solidity Smart Contracts In 2022

3
Comments 1
3 min read
How to install Kyverno in a k8s cluster?

How to install Kyverno in a k8s cluster?

12
Comments
1 min read
10 tips for volunteering devs from data security engineers

10 tips for volunteering devs from data security engineers

10
Comments 1
3 min read
⚖️ Bench (and choose) Java-8 docker images with anchore/grype

⚖️ Bench (and choose) Java-8 docker images with anchore/grype

7
Comments 3
4 min read
How JWT (JSON Web Token) authentication works?

How JWT (JSON Web Token) authentication works?

72
Comments 3
3 min read
Anubis - Python Obfuscator

Anubis - Python Obfuscator

13
Comments
2 min read
4 reasons to avoid using `npm link`

4 reasons to avoid using `npm link`

6
Comments
8 min read
So you think your password is strong

So you think your password is strong

56
Comments 21
2 min read
Service-to-Service Authorization: Non-User Principles

Service-to-Service Authorization: Non-User Principles

5
Comments
8 min read
Handle Sensitive Data Securely with Skyflow

Handle Sensitive Data Securely with Skyflow

9
Comments
6 min read
Is the open-source community ready for protestware ?

Is the open-source community ready for protestware ?

3
Comments
5 min read
PostgreSQL 14: TLS Connection

PostgreSQL 14: TLS Connection

6
Comments
3 min read
13 ways to secure your react.js application

13 ways to secure your react.js application

10
Comments
6 min read
Taking the Pain Out of Securing Your Code: A Native, Automated Approach

Taking the Pain Out of Securing Your Code: A Native, Automated Approach

28
Comments
2 min read
3 ways to make iptables persistent

3 ways to make iptables persistent

8
Comments
2 min read
Main Principles of Security in AWS Cloud

Main Principles of Security in AWS Cloud

8
Comments
2 min read
All you need to know about writing Least Privilege IAM Policies

All you need to know about writing Least Privilege IAM Policies

6
Comments
2 min read
All you need to know about AWS Identity and Access Management (IAM)

All you need to know about AWS Identity and Access Management (IAM)

6
Comments
2 min read
Helpot ohjeet salasanamanagerin käyttöön

Helpot ohjeet salasanamanagerin käyttöön

4
Comments 1
4 min read
Kyverno - Kubernetes native policy management for k8s admins

Kyverno - Kubernetes native policy management for k8s admins

24
Comments
2 min read
Signing requests to AWS services using axios

Signing requests to AWS services using axios

24
Comments 2
5 min read
Defensive Coding Reloaded: A Guide To Active Web Application Defence

Defensive Coding Reloaded: A Guide To Active Web Application Defence

10
Comments
2 min read
Security Pillar - Best Practice Areas

Security Pillar - Best Practice Areas

3
Comments
2 min read
🔐 Authentication: Is Identity-aware Proxy enough for most use cases?

🔐 Authentication: Is Identity-aware Proxy enough for most use cases?

9
Comments 4
1 min read
Adding Two-Factor Authentication Layer To Appsmith Using TypingDNA

Adding Two-Factor Authentication Layer To Appsmith Using TypingDNA

8
Comments
25 min read
Simple instructions on how to use Password Manager - and why

Simple instructions on how to use Password Manager - and why

7
Comments
4 min read
8 Best Content Security Policies for 2022

8 Best Content Security Policies for 2022

6
Comments
6 min read
TryHackMe(THM)-Mrrobot Writeup

TryHackMe(THM)-Mrrobot Writeup

8
Comments
4 min read
AWS Well-Architected Framework - Security Pillar

AWS Well-Architected Framework - Security Pillar

4
Comments
2 min read
OWASP TOP 10 mapped to AWS Managed Rules

OWASP TOP 10 mapped to AWS Managed Rules

13
Comments
2 min read
Is Java as safe as we believe?

Is Java as safe as we believe?

12
Comments
4 min read
Coding standards: what are they and why do you need them

Coding standards: what are they and why do you need them

11
Comments
6 min read
How we implemented encryption and data masking for 60+ apps in 12 weeks

How we implemented encryption and data masking for 60+ apps in 12 weeks

13
Comments
3 min read
Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

Security is open source developers’ most urgent challenge, while complying with government requirements is a rising concern

3
Comments 1
4 min read
Storing Access Policies in Policy Files vs. in a Database

Storing Access Policies in Policy Files vs. in a Database

9
Comments
5 min read
[Parte 10] ASP.NET Core: Refresh Tokens

[Parte 10] ASP.NET Core: Refresh Tokens

25
Comments 4
14 min read
A brief Introduction to OpenAPI Specification

A brief Introduction to OpenAPI Specification

29
Comments 4
4 min read
TryHackMe(THM)-Source Writeup

TryHackMe(THM)-Source Writeup

12
Comments
2 min read
Securing Containers with Seccomp: Part 2

Securing Containers with Seccomp: Part 2

5
Comments
9 min read
Doing DevSecOps without constant CI/CD changes

Doing DevSecOps without constant CI/CD changes

4
Comments
5 min read
SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

SAST in Secure SDLC: 3 reasons to integrate it in a DevSecOps pipeline

3
Comments
7 min read
What we should know in PKI

What we should know in PKI

5
Comments 2
4 min read
Setup AWS Security Hub

Setup AWS Security Hub

5
Comments
4 min read
Setup Amazon GuardDuty and understand its feature

Setup Amazon GuardDuty and understand its feature

3
Comments
3 min read
HttpInterceptor

HttpInterceptor

3
Comments
1 min read
Biometric Access Control Systems: Everything You Need to Know

Biometric Access Control Systems: Everything You Need to Know

6
Comments
5 min read
Controlling access to Lambda Function URLs

Controlling access to Lambda Function URLs

19
Comments 2
5 min read
The 10 Commandments .NET Developers Must apply for Secure Applications

The 10 Commandments .NET Developers Must apply for Secure Applications

112
Comments 11
11 min read
Benefits Of Cloud Testing And Best Practices

Benefits Of Cloud Testing And Best Practices

5
Comments
13 min read
About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

About Optimizing for Speed: How to do complete AWS Security&Compliance Scans in 5 minutes

14
Comments
9 min read
Web <=2.0 Apps/Sites are Never Safe to Use

Web <=2.0 Apps/Sites are Never Safe to Use

5
Comments 1
4 min read
loading...