DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Blockchain Easily Explained

Blockchain Easily Explained

5
Comments 1
2 min read
Beginner's Guide to website security testing

Beginner's Guide to website security testing

9
Comments
5 min read
WebRTC Security in Plain Language for Business People

WebRTC Security in Plain Language for Business People

5
Comments
24 min read
Insecure Deserialization For Beginners

Insecure Deserialization For Beginners

16
Comments
3 min read
C - Unsafe!

C - Unsafe!

9
Comments 4
4 min read
.NET 7 WebApp with Https in Docker, secured by Azure AD

.NET 7 WebApp with Https in Docker, secured by Azure AD

10
Comments 3
4 min read
Being a Securious Cat

Being a Securious Cat

6
Comments
3 min read
AWS IAM Access Analyzer Demystified

AWS IAM Access Analyzer Demystified

7
Comments
4 min read
Secure AWS deploys from Github Actions with OIDC

Secure AWS deploys from Github Actions with OIDC

13
Comments
14 min read
Design your own security vulnerability #1

Design your own security vulnerability #1

4
Comments
2 min read
Acra. Features: Integrate data protection that fits your architecture

Acra. Features: Integrate data protection that fits your architecture

9
Comments 1
2 min read
How Does Face ID or Touch ID Work? Intro to WebAuthn

How Does Face ID or Touch ID Work? Intro to WebAuthn

4
Comments
6 min read
npm-registry-firewall

npm-registry-firewall

2
Comments
4 min read
Does Java 18 finally have a better alternative to JNI?

Does Java 18 finally have a better alternative to JNI?

52
Comments 4
9 min read
Encrypting Attached EBS Volumes

Encrypting Attached EBS Volumes

10
Comments
3 min read
One of these two apple.com domains is fake

One of these two apple.com domains is fake

6
Comments 1
2 min read
How to Not Expose the Personal Data of 19,577 Canadians

How to Not Expose the Personal Data of 19,577 Canadians

9
Comments
4 min read
Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

Introducing PacketStreamer: Distributed Packet Capture for Cloud Native Platforms

4
Comments
4 min read
Cloud Security for Newly Disctributed Enginerring Teams

Cloud Security for Newly Disctributed Enginerring Teams

3
Comments
4 min read
How to fit DevSecOps into CI/CD Pipelines

How to fit DevSecOps into CI/CD Pipelines

9
Comments
5 min read
Public key cryptography: OpenSSH private keys

Public key cryptography: OpenSSH private keys

4
Comments
14 min read
How to use Azure AD Self-Service Sign Up

How to use Azure AD Self-Service Sign Up

10
Comments
3 min read
Self Hostable Open Source Alternatives to Commercial products

Self Hostable Open Source Alternatives to Commercial products

42
Comments
1 min read
Creando Sistemas Auditables con ASP.NET Core - Parte 7: AuditorĂ­a con Audit.NET

Creando Sistemas Auditables con ASP.NET Core - Parte 7: AuditorĂ­a con Audit.NET

24
Comments 8
11 min read
CORS, Preflight request and OPTIONS Method

CORS, Preflight request and OPTIONS Method

7
Comments
5 min read
IAANSEC | WannaCry Analysis Report

IAANSEC | WannaCry Analysis Report

6
Comments
7 min read
Event-Driven serverless architecture to automatically remediate security findings

Event-Driven serverless architecture to automatically remediate security findings

16
Comments
6 min read
Secure your Kubernetes secrets easily with Trousseau

Secure your Kubernetes secrets easily with Trousseau

6
Comments
2 min read
Authentication Patterns and Best Practices For SPAs

Authentication Patterns and Best Practices For SPAs

13
Comments
11 min read
Power of AWS Organization ID in controlling access to AWS resources

Power of AWS Organization ID in controlling access to AWS resources

15
Comments
4 min read
Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability

Suffering Developer Attrition? Remember: Replication Rarely Replaces Recoverability

7
Comments
5 min read
What is Cybersecurity? Its types, advantages and importance.

What is Cybersecurity? Its types, advantages and importance.

8
Comments
7 min read
Another cheat sheet for Dependabot

Another cheat sheet for Dependabot

17
Comments
4 min read
2FA Login Plugin Featuring TOTP

2FA Login Plugin Featuring TOTP

10
Comments
6 min read
New to Cloud or Cloud Security?

New to Cloud or Cloud Security?

4
Comments
3 min read
AutenticaciĂłn y AutorizaciĂłn con JWT en ASP.NET Core (Parte 5)

AutenticaciĂłn y AutorizaciĂłn con JWT en ASP.NET Core (Parte 5)

22
Comments 5
11 min read
OAuth and OIDC: What You Need To Know

OAuth and OIDC: What You Need To Know

7
Comments
11 min read
An Introduction to PCI Compliance

An Introduction to PCI Compliance

13
Comments 1
7 min read
🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)

🕵️ About Java Bytecode, native binaries & security (short Grype benchmark)

5
Comments 2
2 min read
Detection of Malicious Content in Files Uploaded to S3 Bucket

Detection of Malicious Content in Files Uploaded to S3 Bucket

8
Comments
8 min read
Finding and Fixing Cloud Misconfigurations with open source

Finding and Fixing Cloud Misconfigurations with open source

8
Comments
3 min read
Maybe Passwords are the Future

Maybe Passwords are the Future

3
Comments 2
6 min read
Why APIs have become a security nightmare for SMBs and enterprises

Why APIs have become a security nightmare for SMBs and enterprises

15
Comments
3 min read
GraphQL and Security implications

GraphQL and Security implications

32
Comments 2
7 min read
Improving policy readability with NotAction

Improving policy readability with NotAction

6
Comments
4 min read
🦾 Dependency management automation with Dependabot

🦾 Dependency management automation with Dependabot

5
Comments
1 min read
Operational best practices for AWS Well-Architected Framework

Operational best practices for AWS Well-Architected Framework

11
Comments
3 min read
Acra. Features: Security events automation

Acra. Features: Security events automation

9
Comments
2 min read
From Ghost Assets to Infrastructure Drift - Don't Get Spooked

From Ghost Assets to Infrastructure Drift - Don't Get Spooked

6
Comments
5 min read
Pesquisa sobre sistemas de informação para gerenciamento de empresas.

Pesquisa sobre sistemas de informação para gerenciamento de empresas.

8
Comments 1
1 min read
Seven Things a Cyber-Security Enthusiast Should Know

Seven Things a Cyber-Security Enthusiast Should Know

12
Comments 1
4 min read
Remember to set Cache-Control headers on your secured pages

Remember to set Cache-Control headers on your secured pages

5
Comments
2 min read
Processo de certificação ISO/IEC 27001:2013 x V360

Processo de certificação ISO/IEC 27001:2013 x V360

7
Comments
5 min read
How to Approach DevSecOps Security Automation

How to Approach DevSecOps Security Automation

5
Comments
5 min read
Why is an SSL certificate important?🔐

Why is an SSL certificate important?🔐

8
Comments
4 min read
A down-to-earth explication of the noopener noreferrer attributes

A down-to-earth explication of the noopener noreferrer attributes

16
Comments 2
4 min read
GraphQL : The new REST?

GraphQL : The new REST?

65
Comments 23
3 min read
How Courier Became SOC 2 Type 2 Compliant

How Courier Became SOC 2 Type 2 Compliant

5
Comments
5 min read
How to store login credentials, the right way in Flutter.

How to store login credentials, the right way in Flutter.

11
Comments
4 min read
Storing related secrets in Parameter Store for more efficient access

Storing related secrets in Parameter Store for more efficient access

10
Comments
3 min read
loading...