DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
Integrating Azure Secrets into your .NET Web Application

Integrating Azure Secrets into your .NET Web Application

Comments
3 min read
Securing Grafana for Web Access

Securing Grafana for Web Access

2
Comments
5 min read
OAuth2 explained: Bob's tale

OAuth2 explained: Bob's tale

1
Comments
2 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

5
Comments
4 min read
Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

Detectando y evitando el 90% de los Ataques en la Nube con herramientas open-source

2
Comments
10 min read
Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

2
Comments
4 min read
Patching your Auto Scaling Group on AWS

Patching your Auto Scaling Group on AWS

2
Comments
3 min read
PassKey in Go

PassKey in Go

4
Comments 1
9 min read
How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

How to setup the Dependency-Track? ( Dependency-Track : PART - 01 )

1
Comments
5 min read
Overcoming Challenges in Containerized Microservices Architecture: A Case Study

Overcoming Challenges in Containerized Microservices Architecture: A Case Study

1
Comments
2 min read
#DevOps para noobs - Proxy Reverso

#DevOps para noobs - Proxy Reverso

193
Comments 12
3 min read
How to Secure Your AWS Account Using a Hardware security key [YubiKey]

How to Secure Your AWS Account Using a Hardware security key [YubiKey]

7
Comments
3 min read
What is Security Breach?

What is Security Breach?

1
Comments
2 min read
Whitehouse Declares Software Should Be Memory Safe

Whitehouse Declares Software Should Be Memory Safe

27
Comments 17
1 min read
Secure your API with these 16 Practices with Apache APISIX - part 1

Secure your API with these 16 Practices with Apache APISIX - part 1

15
Comments
7 min read
Banana Decryption: Unpacking Caesar Cipher with Power Automate

Banana Decryption: Unpacking Caesar Cipher with Power Automate

7
Comments
1 min read
Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

Navigating the Pitfalls of Broken Authentication: A Real-World Example and Prevention in Web Application Security

2
Comments
2 min read
Methodology: How we discovered over 18,000 API secret tokens

Methodology: How we discovered over 18,000 API secret tokens

Comments
6 min read
Issue 32 of AWS Cloud Security Weekly

Issue 32 of AWS Cloud Security Weekly

Comments
3 min read
IAM Policy Conditions & SQS Queue Access

IAM Policy Conditions & SQS Queue Access

3
Comments
5 min read
Building near real-time automatic remediation for disabled S3 Block Public Access with serverless tools

Building near real-time automatic remediation for disabled S3 Block Public Access with serverless tools

2
Comments
7 min read
Docker Security Scanning in GitLab

Docker Security Scanning in GitLab

Comments
3 min read
Implementing App Security – Here’s How To Do It

Implementing App Security – Here’s How To Do It

2
Comments
4 min read
You need a Proxy Server to proctect you 🛡️🐞

You need a Proxy Server to proctect you 🛡️🐞

2
Comments
3 min read
What is SAML And Why You Should Care

What is SAML And Why You Should Care

16
Comments
7 min read
Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

Top 6 Open Source Identity and Access Management (IAM) Solutions For Enterprises

10
Comments
9 min read
Vulnerability Scanning Solution

Vulnerability Scanning Solution

Comments
3 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Linux Special Permissions: A Comprehensive Guide with Examples

Linux Special Permissions: A Comprehensive Guide with Examples

5
Comments
3 min read
Top Secrets Management Tools for 2024

Top Secrets Management Tools for 2024

4
Comments 1
10 min read
Essential Steps for Securing Your AWS Environment

Essential Steps for Securing Your AWS Environment

1
Comments 1
9 min read
Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

2
Comments
6 min read
Criptografia #0 - Conceitos essenciais

Criptografia #0 - Conceitos essenciais

5
Comments
9 min read
Understand OAuth 2.0 code grant flow 🔐

Understand OAuth 2.0 code grant flow 🔐

12
Comments
5 min read
Deploy SPFx app using pipeline's Workload Identity federation

Deploy SPFx app using pipeline's Workload Identity federation

Comments
3 min read
Celebrating Data Privacy International Day!

Celebrating Data Privacy International Day!

Comments
4 min read
A Passwordless Future: Passkeys for Developers

A Passwordless Future: Passkeys for Developers

11
Comments
11 min read
Relationship Based Access Control (ReBAC): When To Use It

Relationship Based Access Control (ReBAC): When To Use It

7
Comments
8 min read
DIY Home Security Camera System

DIY Home Security Camera System

28
Comments 1
8 min read
Secure Browser Access to code-server VSCode

Secure Browser Access to code-server VSCode

6
Comments 1
4 min read
Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Comments 1
6 min read
AWS VPC Endpoint is NOT a security topic!?

AWS VPC Endpoint is NOT a security topic!?

6
Comments
3 min read
Securing API Keys in SwiftUI: A Practical Guide (Intro)

Securing API Keys in SwiftUI: A Practical Guide (Intro)

1
Comments
5 min read
EBS, seus snapshots e quanto ocupam de espaço

EBS, seus snapshots e quanto ocupam de espaço

3
Comments
5 min read
Fortifying Your Digital Presence: The Significance of Mobile App Security

Fortifying Your Digital Presence: The Significance of Mobile App Security

Comments
6 min read
Level up your vulnerability management skills . . . painlessly

Level up your vulnerability management skills . . . painlessly

2
Comments
1 min read
How to Set Up Runtime Monitoring ECS Cluster Using GuardDuty

How to Set Up Runtime Monitoring ECS Cluster Using GuardDuty

3
Comments
6 min read
Securing your automation: A guide to ensuring Ansible Playbook security

Securing your automation: A guide to ensuring Ansible Playbook security

Comments
7 min read
Re-learning security: detecting package vulnerabilities 🎁 NPM and Nuget.

Re-learning security: detecting package vulnerabilities 🎁 NPM and Nuget.

Comments
6 min read
Secret values in Scala

Secret values in Scala

Comments 1
5 min read
Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

1
Comments
3 min read
What are some fun or scary vulnerabilities you heard about recently??

What are some fun or scary vulnerabilities you heard about recently??

6
Comments 2
1 min read
Permission not granted - on failing to create cross-profile app pairs

Permission not granted - on failing to create cross-profile app pairs

Comments
5 min read
INTRODUCTION TO CYBER SECURITY

INTRODUCTION TO CYBER SECURITY

Comments
3 min read
Approval Phishing Scams See Explosive Boost, With $347 Million Stolen in 2023 – Chainalysis

Approval Phishing Scams See Explosive Boost, With $347 Million Stolen in 2023 – Chainalysis

6
Comments
4 min read
How to Secure Your Network from Hackers?

How to Secure Your Network from Hackers?

5
Comments
4 min read
IOT security

IOT security

Comments
2 min read
JavaScript Objects and its secret associates: Prototype

JavaScript Objects and its secret associates: Prototype

2
Comments
3 min read
loading...