DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Managing and Rotating Secrets with AWS Secrets Manager

Managing and Rotating Secrets with AWS Secrets Manager

13
Comments
4 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

4
Comments
10 min read
The Body Shop of Security: Biometrics

The Body Shop of Security: Biometrics

27
Comments
2 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

52
Comments
9 min read
Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Comments
2 min read
Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

Enable Touch ID Authentication for sudo on macOS Sonoma 14.x

32
Comments
2 min read
Best Python Libraries for Cybersecurity in 2024

Best Python Libraries for Cybersecurity in 2024

14
Comments 8
13 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

291
Comments 1
10 min read
A primer on open-source intelligence for bug bounty hunting in Grafana

A primer on open-source intelligence for bug bounty hunting in Grafana

5
Comments
10 min read
Nations attacking their own internet (to stop cheating on exams)

Nations attacking their own internet (to stop cheating on exams)

17
Comments
1 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

Comments
2 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

Comments 2
2 min read
Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

Comments
2 min read
Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

1
Comments
8 min read
OAuth 2.1 is Here: What You Need to Know

OAuth 2.1 is Here: What You Need to Know

17
Comments
6 min read
Using the Trusty API to discover deprecated and malicious packages.

Using the Trusty API to discover deprecated and malicious packages.

3
Comments
2 min read
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

16
Comments
2 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

8
Comments
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

7
Comments 1
3 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

3
Comments
2 min read
loading...