DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ForwardAuth with Traefik: Streamlining Security for Microservices

ForwardAuth with Traefik: Streamlining Security for Microservices

Comments
6 min read
Upgrading Simple Shells to Fully Interactive TTYs

Upgrading Simple Shells to Fully Interactive TTYs

3
Comments
2 min read
Amazon Simple Storage Service (S3)

Amazon Simple Storage Service (S3)

7
Comments 5
3 min read
Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Comments
2 min read
Understanding the different types of SSH Keys

Understanding the different types of SSH Keys

8
Comments
3 min read
Introducing the AWS CDK L2 Construct: Simplified Security for Amazon CloudFront with Origin Access Control (OAC)

Introducing the AWS CDK L2 Construct: Simplified Security for Amazon CloudFront with Origin Access Control (OAC)

1
Comments
3 min read
Lightweight Web Shell Scanner

Lightweight Web Shell Scanner

Comments
1 min read
The Business Impact of a Cyberattack in 2024: A Deep Dive

The Business Impact of a Cyberattack in 2024: A Deep Dive

Comments
5 min read
Part 1/3: Fundamentals of Web Security in Frontend Development

Part 1/3: Fundamentals of Web Security in Frontend Development

Comments
4 min read
Part 3/3: Advanced Frontend Security Techniques and Tools

Part 3/3: Advanced Frontend Security Techniques and Tools

1
Comments
2 min read
Web Security in Frontend Development: A 3-Part Series for Developers

Web Security in Frontend Development: A 3-Part Series for Developers

2
Comments
2 min read
Part 2/3: Practical Steps to Secure Frontend Applications

Part 2/3: Practical Steps to Secure Frontend Applications

1
Comments
3 min read
The Biggest Crypto Scam in 2024

The Biggest Crypto Scam in 2024

5
Comments
3 min read
Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Why Hashed OTP Tokens Are Better Than Storing Them in a Database

Comments
3 min read
Implement Unrecognized Device Login Alerts in React

Implement Unrecognized Device Login Alerts in React

Comments
3 min read
Common Website Security Risks and How to Avoid Them

Common Website Security Risks and How to Avoid Them

Comments 1
5 min read
AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats

AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats

5
Comments
8 min read
Best DAST Tools to Know About

Best DAST Tools to Know About

Comments
2 min read
Deep Dive 🤿: Where Does Grype Data Come From?

Deep Dive 🤿: Where Does Grype Data Come From?

7
Comments 3
8 min read
Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

Amazon Inspector Integrations: Strengthening Cloud Security with Security Hub and EventBridge

5
Comments 1
3 min read
Your dependencies have dependencies: new features to assess risk

Your dependencies have dependencies: new features to assess risk

14
Comments
2 min read
Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

Zero-Trust Security in K8s Made Simple: Istio Ambient Mesh, No Sidecar Needed

5
Comments
3 min read
The Importance of Regular Software Updates and Patching Vulnerabilities

The Importance of Regular Software Updates and Patching Vulnerabilities

Comments
4 min read
Weaknesses in Two-Factor Authentication

Weaknesses in Two-Factor Authentication

2
Comments 1
1 min read
Secret Linux Commands:

Secret Linux Commands:

Comments 1
1 min read
How I'm Learning SpiceDB

How I'm Learning SpiceDB

9
Comments
4 min read
Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

4
Comments
6 min read
Implementación de Autenticación Segura en Node.js con JWT

Implementación de Autenticación Segura en Node.js con JWT

Comments
4 min read
Kubernetes Horizontal Pod Autoscaler

Kubernetes Horizontal Pod Autoscaler

6
Comments
7 min read
Understanding QR Codes and Choosing the Best QR Code Generators

Understanding QR Codes and Choosing the Best QR Code Generators

1
Comments 1
4 min read
nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

Comments
1 min read
AWS Web Application Firewall (WAF)

AWS Web Application Firewall (WAF)

5
Comments
6 min read
Move hardcoded secrets to a Secrets Manager

Move hardcoded secrets to a Secrets Manager

1
Comments
2 min read
E-wallet Security: How Developers Can Ensure Transaction Protection

E-wallet Security: How Developers Can Ensure Transaction Protection

Comments
2 min read
Custom Role-Based Access Control in NestJS Using Custom Guards

Custom Role-Based Access Control in NestJS Using Custom Guards

1
Comments
3 min read
🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

Comments
3 min read
🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

🔐 How to Implement OAuth 2.0 Authentication in ASP.NET Core with External APIs

3
Comments 3
3 min read
Beyond AES — Modern Encryption for Laravel with XChaCha20

Beyond AES — Modern Encryption for Laravel with XChaCha20

Comments
2 min read
HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant

HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant

7
Comments
8 min read
How to use GitHub Personal Access Tokens Securely

How to use GitHub Personal Access Tokens Securely

7
Comments
6 min read
Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Comments
6 min read
Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Comments
3 min read
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

11
Comments
6 min read
Understanding Security Clearance for IT Jobs

Understanding Security Clearance for IT Jobs

10
Comments
3 min read
Debian 12 … is amazing! How to: Create your custom codehouse [Part 3B/4]

Debian 12 … is amazing! How to: Create your custom codehouse [Part 3B/4]

1
Comments
15 min read
Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Comments
2 min read
Container Security Scanning: Vulnerabilities, Risks and Tooling

Container Security Scanning: Vulnerabilities, Risks and Tooling

Comments
10 min read
BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

Comments
43 min read
Managing Dependabot PRs with dependabot-pr-manager 🤖

Managing Dependabot PRs with dependabot-pr-manager 🤖

26
Comments 4
3 min read
Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

85
Comments 12
4 min read
LINUX CHALLENGE, DAY 4

LINUX CHALLENGE, DAY 4

1
Comments
1 min read
Role-Based Access Control (RBAC) with Feature-Centric Approach

Role-Based Access Control (RBAC) with Feature-Centric Approach

1
Comments
3 min read
Error 403 Unauthorized: Understanding Its Implications for Apache Security

Error 403 Unauthorized: Understanding Its Implications for Apache Security

Comments
6 min read
Elevate Your Next.js Security: Middleware Authorization with Userfront

Elevate Your Next.js Security: Middleware Authorization with Userfront

Comments
4 min read
Understanding Namespaces in Kubernetes

Understanding Namespaces in Kubernetes

10
Comments
6 min read
Schema Validation in Amazon DynamoDB

Schema Validation in Amazon DynamoDB

1
Comments
2 min read
BSides Orlando 2024: Insights, Innovations, and Security Adventures

BSides Orlando 2024: Insights, Innovations, and Security Adventures

Comments
7 min read
Security news weekly round-up - 8th November 2024

Security news weekly round-up - 8th November 2024

Comments
4 min read
What Was GCHQ's Project Tempora? Is This Still Was?

What Was GCHQ's Project Tempora? Is This Still Was?

2
Comments
13 min read
Laravel Application Security

Laravel Application Security

Comments 1
2 min read
loading...