DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to respond to growing supply chain security risks?

How to respond to growing supply chain security risks?

5
Comments
3 min read
Hashids en ASP.NET Core: Protegiendo tus URLs (Parte 4)

Hashids en ASP.NET Core: Protegiendo tus URLs (Parte 4)

14
Comments 1
5 min read
Lisp machine security

Lisp machine security

2
Comments
1 min read
Auto Remediation with Eventbridge, Step Functions, and the AWS SDK Integration

Auto Remediation with Eventbridge, Step Functions, and the AWS SDK Integration

14
Comments
7 min read
Security news weekly round-up - 1st April 2022

Security news weekly round-up - 1st April 2022

5
Comments
4 min read
The THREAT HUNTER of your Cloud - Amazon Detective

The THREAT HUNTER of your Cloud - Amazon Detective

8
Comments
2 min read
Go Build in the Cloud Pt2

Go Build in the Cloud Pt2

5
Comments 1
1 min read
The IAM introduction I wish I had

The IAM introduction I wish I had

93
Comments
5 min read
Discuss: package sabotage

Discuss: package sabotage

26
Comments 34
1 min read
A rundown of the biggest cyber attacks & breaches in 2021 - and what lies ahead for us

A rundown of the biggest cyber attacks & breaches in 2021 - and what lies ahead for us

8
Comments
6 min read
Acra. Features: Logging, audit logging and crypto-signed audit logs

Acra. Features: Logging, audit logging and crypto-signed audit logs

9
Comments
2 min read
Securing Containers with Seccomp: Part 1

Securing Containers with Seccomp: Part 1

6
Comments
7 min read
Using kubectl to Restart a Kubernetes Pod

Using kubectl to Restart a Kubernetes Pod

8
Comments
4 min read
What even is an Open Source Program Office - with Spotify, Aiven & Wipro

What even is an Open Source Program Office - with Spotify, Aiven & Wipro

15
Comments 2
7 min read
Spring Remote Code Execution Vulnerability

Spring Remote Code Execution Vulnerability

12
Comments
1 min read
The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

The Browser in the Browser (BITB) Attack: Lies, Deceit, and CSS

10
Comments 4
10 min read
DEPLOY CONTRACTS WITH OPENZEPPELIN DEFENDER RELAYER

DEPLOY CONTRACTS WITH OPENZEPPELIN DEFENDER RELAYER

12
Comments
3 min read
Your inbox is not a digital safe

Your inbox is not a digital safe

54
Comments 6
3 min read
Getting Started with GraphQL Security

Getting Started with GraphQL Security

7
Comments 1
8 min read
Data Recovery Software For RAW File System

Data Recovery Software For RAW File System

3
Comments
9 min read
Cyber-Security and the Game Theory.

Cyber-Security and the Game Theory.

6
Comments
5 min read
Simulating a Phishing Attack Against Your Company

Simulating a Phishing Attack Against Your Company

5
Comments
3 min read
Centralising audit, compliance and incident detection

Centralising audit, compliance and incident detection

22
Comments
13 min read
How to avoid AWS Cloud Security Mistakes

How to avoid AWS Cloud Security Mistakes

4
Comments
4 min read
Building a Transport Protocol on ARP

Building a Transport Protocol on ARP

6
Comments
8 min read
The Psychology Behind Late-Stage Software Testing

The Psychology Behind Late-Stage Software Testing

5
Comments 2
6 min read
Introduction aux enquêtes basées sur l'OSINT

Introduction aux enquêtes basées sur l'OSINT

6
Comments
3 min read
AWS IoT - Securing Your Connected Devices, Connections, and Data

AWS IoT - Securing Your Connected Devices, Connections, and Data

10
Comments
2 min read
What is browser fingerprinting and why should you integrate with your website?

What is browser fingerprinting and why should you integrate with your website?

7
Comments
3 min read
RBAC, ABAC and CapBAC in IoT

RBAC, ABAC and CapBAC in IoT

13
Comments
2 min read
How to password protect any website?

How to password protect any website?

12
Comments
2 min read
Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

Using ARMO Kubescape to scale kubernetes security adoption across an enterprise

10
Comments
14 min read
Is your robots.txt file vulnerable? Here's how to check and secure it

Is your robots.txt file vulnerable? Here's how to check and secure it

6
Comments
3 min read
Automating Prowler for Compliance Checking in AWS

Automating Prowler for Compliance Checking in AWS

11
Comments 1
5 min read
Understanding password storage

Understanding password storage

28
Comments
4 min read
Bug Bounty: Not always an ideal

Bug Bounty: Not always an ideal

29
Comments 4
2 min read
Garder le Dependabot sous contrôle

Garder le Dependabot sous contrôle

6
Comments
5 min read
Restric Access to Cloudfront Distribution using Lambda@Edge

Restric Access to Cloudfront Distribution using Lambda@Edge

19
Comments 3
2 min read
The pillars of a “good”, that lead us to eventual great software and products.

The pillars of a “good”, that lead us to eventual great software and products.

7
Comments
6 min read
How to read encoded authorization error messages in AWS

How to read encoded authorization error messages in AWS

10
Comments
4 min read
Securing your Load Balancer with CloudFront

Securing your Load Balancer with CloudFront

16
Comments
2 min read
OverTheWire Bandit Levels 19-34 Hints and Notes

OverTheWire Bandit Levels 19-34 Hints and Notes

6
Comments
12 min read
User Office Hours: Building a Secure CI/CD Pipeline with GitHub Actions and Snyk

User Office Hours: Building a Secure CI/CD Pipeline with GitHub Actions and Snyk

6
Comments
1 min read
Setting up a multi-account AWS environment

Setting up a multi-account AWS environment

38
Comments
8 min read
Adding AWS SSO and controlling permissions

Adding AWS SSO and controlling permissions

20
Comments 3
11 min read
AWS VPC with AWS VPN Client vs. OpenVPN Access Server

AWS VPC with AWS VPN Client vs. OpenVPN Access Server

10
Comments
1 min read
Acra. Features: Data leakage detection

Acra. Features: Data leakage detection

9
Comments
2 min read
Protect your Amazon CloudFront content — Authorization@Edge using cookies

Protect your Amazon CloudFront content — Authorization@Edge using cookies

7
Comments
2 min read
Why Safe Programming Matters and Why a Language Like Rust Matters

Why Safe Programming Matters and Why a Language Like Rust Matters

57
Comments 6
10 min read
Don't let your users get pwned via email HTML injection

Don't let your users get pwned via email HTML injection

4
Comments 1
8 min read
Website Security Tips

Website Security Tips

10
Comments
4 min read
Hashes are surprisingly fun

Hashes are surprisingly fun

3
Comments 1
3 min read
Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist

Bootstrapping a Secure AWS as-Code Environment - Your MVS Checklist

5
Comments
7 min read
Incident Response on AWS

Incident Response on AWS

13
Comments
5 min read
Shisho Cloud evolved into a more sophisticated and developer-friendly security tool

Shisho Cloud evolved into a more sophisticated and developer-friendly security tool

5
Comments
3 min read
A Step-by-step Guide to Preventing Tailgating Attacks

A Step-by-step Guide to Preventing Tailgating Attacks

5
Comments
6 min read
Deploying IAC with your secrets in Terraform Vault

Deploying IAC with your secrets in Terraform Vault

18
Comments
3 min read
Is it worthwhile to upgrade from Slack's free plan to the paid one?

Is it worthwhile to upgrade from Slack's free plan to the paid one?

5
Comments
4 min read
Go build in the Cloud 1

Go build in the Cloud 1

8
Comments
1 min read
From Software Developer to Ethical Hacker

From Software Developer to Ethical Hacker

19
Comments 1
3 min read
loading...