DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
An SSO primer: what is it, and how does it work?

An SSO primer: what is it, and how does it work?

7
Comments
5 min read
👮🏽Amazon Inspector - Automated and Continual vulnerability management at scale

👮🏽Amazon Inspector - Automated and Continual vulnerability management at scale

7
Comments
3 min read
Automating your CloudQuery Policies with CircleCI

Automating your CloudQuery Policies with CircleCI

8
Comments
6 min read
Raising the Bar on Security by Purging Credentials From the Cloud

Raising the Bar on Security by Purging Credentials From the Cloud

2
Comments 1
7 min read
Delegating control with an advanced multi-tenant setup in Kubernetes

Delegating control with an advanced multi-tenant setup in Kubernetes

2
Comments
5 min read
SSO without Standards: Simple Yet Secure Authentication in Legacy Systems

SSO without Standards: Simple Yet Secure Authentication in Legacy Systems

2
Comments
4 min read
Sign Your Container Images with Cosign, GitHub Actions and GitHub Container Registry

Sign Your Container Images with Cosign, GitHub Actions and GitHub Container Registry

14
Comments 2
9 min read
Cloud Governance For The DevOps Pro

Cloud Governance For The DevOps Pro

2
Comments
3 min read
HashiConf Europe returns to Amsterdam June 20-22

HashiConf Europe returns to Amsterdam June 20-22

5
Comments
1 min read
Policies in NodeJS - Part 1

Policies in NodeJS - Part 1

17
Comments 1
5 min read
Running AWS Foundational Security Best Practices with CloudQuery Policies

Running AWS Foundational Security Best Practices with CloudQuery Policies

5
Comments
2 min read
What is ModSecurity? Installation Guide for Apache on Ubuntu

What is ModSecurity? Installation Guide for Apache on Ubuntu

3
Comments
1 min read
Spring Security. Managing users

Spring Security. Managing users

7
Comments
4 min read
Adding Custom Domains to your SaaS

Adding Custom Domains to your SaaS

33
Comments 15
7 min read
What is the difference between encryption, hashing and salting?

What is the difference between encryption, hashing and salting?

31
Comments 4
6 min read
Dynamic JWT authentication and secrets rotation in Rails Applications

Dynamic JWT authentication and secrets rotation in Rails Applications

10
Comments
3 min read
Why are we organizing a tech conference called SRE NEXT 2022?

Why are we organizing a tech conference called SRE NEXT 2022?

7
Comments
4 min read
Protegendo a comunicação do Flutter com o Couchbase

Protegendo a comunicação do Flutter com o Couchbase

10
Comments
12 min read
Using hardware tokens for two-factor authentication: how does it work?

Using hardware tokens for two-factor authentication: how does it work?

15
Comments 1
8 min read
How to pass Certified Cloud Security Professional (CCSP) Exam?

How to pass Certified Cloud Security Professional (CCSP) Exam?

4
Comments
1 min read
Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)

Securing Your API With Long-Lived Authentication Keys (With A Deep-Dive!)

5
Comments
9 min read
Three steps to better account security

Three steps to better account security

37
Comments
3 min read
Magic Link Login: Simple, Easy and Secure

Magic Link Login: Simple, Easy and Secure

11
Comments
5 min read
🚔 Policing with Amazon Macie - Security & Compliance

🚔 Policing with Amazon Macie - Security & Compliance

9
Comments 3
3 min read
«Avira» Antivirus Removed Files by Mistake – How to Recover Them?

«Avira» Antivirus Removed Files by Mistake – How to Recover Them?

2
Comments
5 min read
Acra. Features: Database request firewall

Acra. Features: Database request firewall

5
Comments
2 min read
Content Security Policy with PHP

Content Security Policy with PHP

7
Comments
2 min read
Creating an end-to-end encrypted chat with GetStream.io and seald.io

Creating an end-to-end encrypted chat with GetStream.io and seald.io

16
Comments
8 min read
How to remove Nginx server version and name.

How to remove Nginx server version and name.

13
Comments
3 min read
PwnKit, or how 12-year-old code can give root to unprivileged users

PwnKit, or how 12-year-old code can give root to unprivileged users

6
Comments
3 min read
How to remove files safely from an HDD or SSD in Windows 10

How to remove files safely from an HDD or SSD in Windows 10

5
Comments
6 min read
How to Mitigate IoT Security Threats in 2022

How to Mitigate IoT Security Threats in 2022

9
Comments
6 min read
Creating a simple REST API in Deno

Creating a simple REST API in Deno

7
Comments
8 min read
How to Secure your NodeJs Express Javascript Application - part 2

How to Secure your NodeJs Express Javascript Application - part 2

14
Comments
5 min read
What are policies and how do you use them with CloudQuery?

What are policies and how do you use them with CloudQuery?

4
Comments
6 min read
Authenticate third-party API's in Next.js using HttpOnly cookies and axios interceptors

Authenticate third-party API's in Next.js using HttpOnly cookies and axios interceptors

10
Comments
7 min read
User Office Hours: Introduction to Snyk Code

User Office Hours: Introduction to Snyk Code

Comments
1 min read
Cyber Security: A run through.

Cyber Security: A run through.

47
Comments 6
6 min read
AWS CLI - do it right

AWS CLI - do it right

12
Comments
9 min read
Creating a Certificate Authority for testing with Azure Container Instances

Creating a Certificate Authority for testing with Azure Container Instances

6
Comments
7 min read
Managing service accounts with Terraform for GCP

Managing service accounts with Terraform for GCP

3
Comments
2 min read
AWS Cognito JWT Verification

AWS Cognito JWT Verification

3
Comments
1 min read
Managing Access Tokens in React or React Native with Axios and Context API.

Managing Access Tokens in React or React Native with Axios and Context API.

7
Comments
2 min read
How to securely use Google API service account credentials in a public repo

How to securely use Google API service account credentials in a public repo

9
Comments
3 min read
Win free swag by fixing security vulnerabilities

Win free swag by fixing security vulnerabilities

7
Comments 1
2 min read
What causes imposter syndrome among software developers?

What causes imposter syndrome among software developers?

7
Comments
2 min read
The One Hash Function You Need, BCrypt

The One Hash Function You Need, BCrypt

6
Comments
5 min read
Custom SSL Certificates for Your Dev Environment

Custom SSL Certificates for Your Dev Environment

9
Comments 1
3 min read
Why does my app send network requests when I open an SVG file?

Why does my app send network requests when I open an SVG file?

5
Comments
9 min read
Stop AWS Account Hacks

Stop AWS Account Hacks

22
Comments 3
4 min read
Injecting backdoors to NPM packages

Injecting backdoors to NPM packages

42
Comments 1
6 min read
7 Must-Haves For Ultimate AWS Security

7 Must-Haves For Ultimate AWS Security

6
Comments
1 min read
How to use a secure private NuGet source in Visual Studio or JetBrains Rider

How to use a secure private NuGet source in Visual Studio or JetBrains Rider

22
Comments 1
5 min read
Securing RMarkdown Documents

Securing RMarkdown Documents

5
Comments
1 min read
A Complete Explanation to DevSecOps

A Complete Explanation to DevSecOps

2
Comments
1 min read
'Code injection' in AWS CodePipeline

'Code injection' in AWS CodePipeline

7
Comments 6
4 min read
Create a React App with Biometric Authentication

Create a React App with Biometric Authentication

7
Comments
7 min read
Use ZAP to Perform DAST (Dynamic Application Security Testing)

Use ZAP to Perform DAST (Dynamic Application Security Testing)

8
Comments 1
5 min read
Read-only buckets in shared AWS accounts

Read-only buckets in shared AWS accounts

5
Comments
5 min read
How to Safely Share Passwords and Secrets Codes Online

How to Safely Share Passwords and Secrets Codes Online

4
Comments
3 min read
loading...