DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Tercera parte

1
Comments
3 min read
Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

Opening Pandora's Container - How Exposing the Docker Socket Paves the Way to Host Control (Part 1)

1
Comments
3 min read
Is Authentication Just About What The Server And Client Know And Don't Know?

Is Authentication Just About What The Server And Client Know And Don't Know?

Comments
2 min read
JWT at a Glance

JWT at a Glance

Comments
13 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

4
Comments
4 min read
Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

Understanding JWT in Node.js: A Guide with Pros, Cons, and Code Examples

6
Comments 1
2 min read
Proteção em dispositivos móveis.

Proteção em dispositivos móveis.

Comments
2 min read
Data Validation Techniques

Data Validation Techniques

20
Comments
1 min read
Top 10 Tips with Code Examples: How to Secure Your C# Application

Top 10 Tips with Code Examples: How to Secure Your C# Application

9
Comments
3 min read
Re-rebuilding TF2.8 image: 369 patches

Re-rebuilding TF2.8 image: 369 patches

Comments
1 min read
Securing Rails application with Action Policy

Securing Rails application with Action Policy

Comments
4 min read
Security news weekly round-up - 20th September 2024

Security news weekly round-up - 20th September 2024

1
Comments
3 min read
Geolocation fun with Gemini

Geolocation fun with Gemini

1
Comments
7 min read
Secure API Key Handling in Python Projects

Secure API Key Handling in Python Projects

1
Comments
2 min read
CORS (Cross-Origin Resource Sharing) 🌐

CORS (Cross-Origin Resource Sharing) 🌐

Comments
9 min read
Flexible policy enforcement with Minder profile selectors

Flexible policy enforcement with Minder profile selectors

4
Comments
1 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

Comments
3 min read
Critical LLM Security Risks and Best Practices for Teams

Critical LLM Security Risks and Best Practices for Teams

38
Comments
8 min read
Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

4
Comments
5 min read
The Easiest Network Attack for Beginners: ARP Spoofing

The Easiest Network Attack for Beginners: ARP Spoofing

Comments
5 min read
AuthenticationHandler in ASPNET

AuthenticationHandler in ASPNET

11
Comments 1
3 min read
Implement mTLS on AWS ALB with Self-Signed Certificates

Implement mTLS on AWS ALB with Self-Signed Certificates

5
Comments
5 min read
Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Comments
5 min read
ACTING (like we care about) Security

ACTING (like we care about) Security

3
Comments
6 min read
How to secure Terraform code with Trivy

How to secure Terraform code with Trivy

Comments
15 min read
Securing Data(Live event): A Guide to Microsoft DLP 🔒💻

Securing Data(Live event): A Guide to Microsoft DLP 🔒💻

Comments
3 min read
🌐 SSL Certificates and How to Implement Them in Your Website 🔐

🌐 SSL Certificates and How to Implement Them in Your Website 🔐

1
Comments 1
3 min read
Admission Controllers in Kubernetes: OPA GateKeeper, Kyverno, and Azure Policy Add-on for AKS—Which One Wins? 🏆

Admission Controllers in Kubernetes: OPA GateKeeper, Kyverno, and Azure Policy Add-on for AKS—Which One Wins? 🏆

Comments
4 min read
AuthorizationEndpoint vs TokenEndpoint

AuthorizationEndpoint vs TokenEndpoint

1
Comments
3 min read
Breaking a TOTP?

Breaking a TOTP?

Comments
5 min read
How to Use Shadow DOM and Honeypots to Deter Crawlers

How to Use Shadow DOM and Honeypots to Deter Crawlers

5
Comments
5 min read
Optimizing Keycloak Caches: Best Practices for Embedded and External Infinispan

Optimizing Keycloak Caches: Best Practices for Embedded and External Infinispan

8
Comments 2
6 min read
AWS_WAF Bot Control Managed Rule expands bot detection capabilities to enhance web application security.

AWS_WAF Bot Control Managed Rule expands bot detection capabilities to enhance web application security.

1
Comments
1 min read
Microsoft Azure Key Vaults

Microsoft Azure Key Vaults

Comments
1 min read
How Diffie-Hellman Key Exchange can Cause Availability Issues

How Diffie-Hellman Key Exchange can Cause Availability Issues

Comments
8 min read
Securely Connecting Azure Container Apps to Azure OpenAI Using User Managed Identity

Securely Connecting Azure Container Apps to Azure OpenAI Using User Managed Identity

6
Comments
17 min read
Introducing Omni4J: Secure your Java code

Introducing Omni4J: Secure your Java code

Comments
2 min read
Securing APIs with YARP: Authentication and Authorization in .NET 8 Minimal APIs

Securing APIs with YARP: Authentication and Authorization in .NET 8 Minimal APIs

2
Comments
4 min read
🛡️ Effective Vulnerability Monitoring in Kubernetes

🛡️ Effective Vulnerability Monitoring in Kubernetes

Comments
7 min read
Securing JavaScript Applications: Common Vulnerabilities and How to Avoid Them

Securing JavaScript Applications: Common Vulnerabilities and How to Avoid Them

1
Comments
4 min read
Having Defense In-Depth in Azure

Having Defense In-Depth in Azure

Comments
1 min read
Comprehensive Guide to Integrating SonarCloud with GitHub Projects

Comprehensive Guide to Integrating SonarCloud with GitHub Projects

Comments
4 min read
Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Phishing Threats: How Sennovate’s SAT as a Service Could Have Helped Columbus

Comments
2 min read
GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices

GitHub Copilot Security and Privacy Concerns: Understanding the Risks and Best Practices

3
Comments 2
8 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Segunda parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Segunda parte

Comments
5 min read
LLM Adversarial Attacks: How Are Attackers Maliciously Prompting LLMs and Steps To Safeguard Your Applications

LLM Adversarial Attacks: How Are Attackers Maliciously Prompting LLMs and Steps To Safeguard Your Applications

3
Comments
20 min read
Dynamic SQL Best Practices (or "How to Avoid Both SQL Injection Vulnerabilities and Spaghetti Code")

Dynamic SQL Best Practices (or "How to Avoid Both SQL Injection Vulnerabilities and Spaghetti Code")

1
Comments
11 min read
Security news weekly round-up - 13th September 2024

Security news weekly round-up - 13th September 2024

Comments
3 min read
Protecting Democracy Through Fine-Grained Authorization

Protecting Democracy Through Fine-Grained Authorization

29
Comments 1
4 min read
Protecting Your Node.js App from SQL Injection & XSS Attacks

Protecting Your Node.js App from SQL Injection & XSS Attacks

5
Comments 1
12 min read
SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

SafeLine WAF: The Ultimate Lightweight Web Application Firewall for Security

10
Comments
3 min read
Securing Your Azure Resources: A Guide to Using Read-Only and Delete Locks

Securing Your Azure Resources: A Guide to Using Read-Only and Delete Locks

Comments
2 min read
Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Welcome to Episode 2: 'Securing Your Accounts with Two-Factor Authentication'

Comments
1 min read
Hacked by… Postman?

Hacked by… Postman?

Comments 1
1 min read
Top 5 AI Models YOU Can Run Locally on YOUR Device! 🤯

Top 5 AI Models YOU Can Run Locally on YOUR Device! 🤯

120
Comments 42
6 min read
Step by Step Guide to Remediate Data Vulnerability

Step by Step Guide to Remediate Data Vulnerability

1
Comments
2 min read
Authorization In Laravel - A Beginner's Guide

Authorization In Laravel - A Beginner's Guide

Comments
3 min read
The Human Dependency Graph: Why We Need to Rethink Security in Open Source

The Human Dependency Graph: Why We Need to Rethink Security in Open Source

4
Comments
4 min read
loading...