DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
7 things you should know about CYBERSECURITY for 2022

7 things you should know about CYBERSECURITY for 2022

13
Comments
3 min read
Using Serverless to Scan Files with ClamAV in a Lambda Container

Using Serverless to Scan Files with ClamAV in a Lambda Container

16
Comments 17
4 min read
Automated rotating of AWS access keys in Bitbucket pipelines

Automated rotating of AWS access keys in Bitbucket pipelines

13
Comments 2
4 min read
Goodbye ENV Files

Goodbye ENV Files

4
Comments
6 min read
7 Best Practices for Securing Your Remote Workforce with Identity Management

7 Best Practices for Securing Your Remote Workforce with Identity Management

4
Comments 2
3 min read
Has Anyone Landed an Entry Level Cyber Security Job?!!

Has Anyone Landed an Entry Level Cyber Security Job?!!

2
Comments 1
1 min read
Security news weekly round-up - 20th August 2021

Security news weekly round-up - 20th August 2021

2
Comments
3 min read
Pismo’s tech stack – the technologies we use to create our platform

Pismo’s tech stack – the technologies we use to create our platform

6
Comments
3 min read
Why Should You Use A VPN?

Why Should You Use A VPN?

6
Comments
1 min read
Verifying Google Chat request in NodeJS

Verifying Google Chat request in NodeJS

18
Comments 1
2 min read
Behavioral Biometrics - Next Stage Of eCommerce Customer Experience

Behavioral Biometrics - Next Stage Of eCommerce Customer Experience

4
Comments
4 min read
Security best practices in IAM.. Summarized.

Security best practices in IAM.. Summarized.

5
Comments
7 min read
Make sure you know which Unicode version is supported by your programming language version

Make sure you know which Unicode version is supported by your programming language version

2
Comments
3 min read
How immutable data can benefit your data-driven application.

How immutable data can benefit your data-driven application.

15
Comments
2 min read
Keeping Yourself Safe Online

Keeping Yourself Safe Online

9
Comments 2
2 min read
These 7 PHP mistakes leave your website open to the hackers

These 7 PHP mistakes leave your website open to the hackers

33
Comments 6
4 min read
8 Biggest Website Security Mistakes Businesses Make

8 Biggest Website Security Mistakes Businesses Make

6
Comments
3 min read
Cryptography and Ciphers explained

Cryptography and Ciphers explained

6
Comments
4 min read
Open edx SSO - Auth0

Open edx SSO - Auth0

2
Comments
3 min read
Productionize multi AWS Accounts (org-formation Landing Zone)

Productionize multi AWS Accounts (org-formation Landing Zone)

9
Comments 2
3 min read
How serverless helps keep your WordPress site secure

How serverless helps keep your WordPress site secure

1
Comments
6 min read
My "hacking" bookmarks / tools

My "hacking" bookmarks / tools

11
Comments
5 min read
Linux Capabilities Use Cases - systemd

Linux Capabilities Use Cases - systemd

3
Comments
6 min read
Five Common Cloud Security Threats and Data Breaches

Five Common Cloud Security Threats and Data Breaches

21
Comments 4
8 min read
Spring Security Architecture fundamentals

Spring Security Architecture fundamentals

3
Comments 2
4 min read
Sigstore: A Solution to Software Supply Chain Security

Sigstore: A Solution to Software Supply Chain Security

10
Comments
6 min read
Securely connecting to third party AWS accounts using cross account roles

Securely connecting to third party AWS accounts using cross account roles

11
Comments
5 min read
Balancing Clarity, Elegance, and Risk in Regular Expressions

Balancing Clarity, Elegance, and Risk in Regular Expressions

2
Comments
17 min read
Creating Image Hash Collisions

Creating Image Hash Collisions

5
Comments
5 min read
The Easiest Way to Enable Tls 1.2 and Disable Cipher suits without troubles

The Easiest Way to Enable Tls 1.2 and Disable Cipher suits without troubles

1
Comments
3 min read
Git: scanning repositories for secrets using Gitleaks

Git: scanning repositories for secrets using Gitleaks

8
Comments
11 min read
Linux Capabilities Set and Bits

Linux Capabilities Set and Bits

9
Comments
4 min read
Why we need multiple or various code analysis tools?

Why we need multiple or various code analysis tools?

8
Comments
3 min read
What is Apple thinking?

What is Apple thinking?

62
Comments 52
1 min read
IAM: What happens when you assume a role?

IAM: What happens when you assume a role?

34
Comments
6 min read
Using Environment Variables

Using Environment Variables

3
Comments
2 min read
Build End-to-End Encryption in 51 lines of Rust

Build End-to-End Encryption in 51 lines of Rust

43
Comments 2
8 min read
Using Serverless to Scan Files with a ClamAV Lambda Layer

Using Serverless to Scan Files with a ClamAV Lambda Layer

11
Comments 11
6 min read
44 - AKS, AGIC and Kubenet - Tips and tricks to make it work

44 - AKS, AGIC and Kubenet - Tips and tricks to make it work

3
Comments
1 min read
Developing secure systems (Part 1): Why it matters

Developing secure systems (Part 1): Why it matters

8
Comments 5
9 min read
Developing secure systems (Part 2): Protecting data & passwords

Developing secure systems (Part 2): Protecting data & passwords

3
Comments
11 min read
Linux Capabilities Overview

Linux Capabilities Overview

9
Comments
2 min read
There are better options for a privacy-respecting phone

There are better options for a privacy-respecting phone

15
Comments 3
7 min read
Bootstrap Security in Kubernetes Deployments

Bootstrap Security in Kubernetes Deployments

3
Comments
13 min read
Understanding Subresource Integrity (SRI)

Understanding Subresource Integrity (SRI)

6
Comments 1
6 min read
Dealing with Environment Variables in Flask

Dealing with Environment Variables in Flask

32
Comments 6
7 min read
How to Create Secret Tokens in Python

How to Create Secret Tokens in Python

3
Comments
2 min read
Attacks on privacy. Why do we need PETs?

Attacks on privacy. Why do we need PETs?

5
Comments 1
7 min read
TryHackMe Super-Spam Walkthrough

TryHackMe Super-Spam Walkthrough

6
Comments
14 min read
AWS Config -An intro

AWS Config -An intro

7
Comments 1
2 min read
Why Secrets Management Is NOT Just a Key-Value Store

Why Secrets Management Is NOT Just a Key-Value Store

2
Comments
7 min read
Automated Vulnerability Prioritization in the Context of the Cloud

Automated Vulnerability Prioritization in the Context of the Cloud

12
Comments
5 min read
CockroachDB - simulating RBAC

CockroachDB - simulating RBAC

6
Comments 1
3 min read
Azure DevOps: Terraform variables with Azure Key Vault

Azure DevOps: Terraform variables with Azure Key Vault

17
Comments
3 min read
Save your Passwords | A Django Project

Save your Passwords | A Django Project

6
Comments
6 min read
Why you should start your wargames journey?

Why you should start your wargames journey?

2
Comments
2 min read
Export database snapshots manually to S3 & export S3 content in Glue Data Catalog using Crawler for tables fetched in Athena

Export database snapshots manually to S3 & export S3 content in Glue Data Catalog using Crawler for tables fetched in Athena

14
Comments 3
11 min read
Security news weekly round-up - 6th August 2021

Security news weekly round-up - 6th August 2021

2
Comments
3 min read
Cómo mejorar la seguridad de tu API

Cómo mejorar la seguridad de tu API

6
Comments 1
5 min read
What is YAML File?

What is YAML File?

5
Comments
1 min read
loading...