DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 28 - Secure Your Kubernetes Deployments: A Beginner's Guide to Anchore

Day 28 - Secure Your Kubernetes Deployments: A Beginner's Guide to Anchore

3
Comments
3 min read
10 Tips for Efficiently Using Python in Web Development

10 Tips for Efficiently Using Python in Web Development

Comments
2 min read
Enhancing Security: A Guide to System Hardening and AWS Tools 🛡️

Enhancing Security: A Guide to System Hardening and AWS Tools 🛡️

1
Comments
3 min read
Azure AI Security Best Practices: How Microsoft Protects AI Workloads

Azure AI Security Best Practices: How Microsoft Protects AI Workloads

3
Comments
4 min read
Combining the benefits of session tokens and JWTs

Combining the benefits of session tokens and JWTs

9
Comments
6 min read
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

Comments
1 min read
How to use PwnFox with Burp Suite

How to use PwnFox with Burp Suite

5
Comments
3 min read
Manage Sensitive API Keys in Public Dotfiles Using PGP and SOPS

Manage Sensitive API Keys in Public Dotfiles Using PGP and SOPS

1
Comments
8 min read
How to remove your secrets from your Git repository?

How to remove your secrets from your Git repository?

1
Comments
2 min read
Why Cyber Security Testing is Essential for Compliance and Regulation

Why Cyber Security Testing is Essential for Compliance and Regulation

2
Comments 1
5 min read
VPC explained!

VPC explained!

Comments
9 min read
Understanding the JWT

Understanding the JWT

1
Comments
4 min read
Cold Storage: A Deep Dive into the Frozen Vaults of Data

Cold Storage: A Deep Dive into the Frozen Vaults of Data

2
Comments
11 min read
Spring Security For Beginners — Part 1

Spring Security For Beginners — Part 1

Comments
4 min read
DEF CON 32: What We Learned About Secrets Security at AppSec Village

DEF CON 32: What We Learned About Secrets Security at AppSec Village

8
Comments 1
9 min read
Archivo .env para las variables de entorno en Python

Archivo .env para las variables de entorno en Python

3
Comments
2 min read
Solana and Ethereum Internals: A Human-Centric Exploration

Solana and Ethereum Internals: A Human-Centric Exploration

1
Comments
4 min read
What Is a Distributed Denial-of-Service attack

What Is a Distributed Denial-of-Service attack

Comments
1 min read
🚀 Boost Your Node.js Security with Helmet.js! 🛡️

🚀 Boost Your Node.js Security with Helmet.js! 🛡️

Comments
1 min read
Mastering Security and Compliance in the AWS Cloud

Mastering Security and Compliance in the AWS Cloud

5
Comments
5 min read
Install and Configure Proxmox VE with Windows Server VM set up and configured for Active Directory.

Install and Configure Proxmox VE with Windows Server VM set up and configured for Active Directory.

1
Comments
7 min read
How an API Gateway Will Help You Scale, Secure, & Simplify Your API

How an API Gateway Will Help You Scale, Secure, & Simplify Your API

Comments
8 min read
About the gosec G115 drama, or how I faced back integer conversion overflow in Go 🤯

About the gosec G115 drama, or how I faced back integer conversion overflow in Go 🤯

25
Comments
2 min read
OAuth2 in Simple Terms

OAuth2 in Simple Terms

Comments
10 min read
Transforming Email API Chaos into Order

Transforming Email API Chaos into Order

9
Comments
4 min read
Understanding Single Sign-On (SSO) and SAML: Simplified

Understanding Single Sign-On (SSO) and SAML: Simplified

5
Comments 2
3 min read
Managing Cloud Costs and Security with Tailwarden

Managing Cloud Costs and Security with Tailwarden

Comments
5 min read
Data Security Strategy Beyond Access Control: Data Encryption

Data Security Strategy Beyond Access Control: Data Encryption

2
Comments
5 min read
Secure your app in just a few lines of code using Arcjet! ✈️

Secure your app in just a few lines of code using Arcjet! ✈️

44
Comments 9
6 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Primera parte.

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Primera parte.

Comments
7 min read
🌐 MongoDB在金融行业: 向量搜索和ACID事务 💰

🌐 MongoDB在金融行业: 向量搜索和ACID事务 💰

5
Comments
1 min read
Session, Cookie, JWT, Token, SSO, and OAuth 2.0

Session, Cookie, JWT, Token, SSO, and OAuth 2.0

3
Comments 1
3 min read
Implementing Single Sign-On (SSO) in Your Microsoft Teams Bot App [Part II]

Implementing Single Sign-On (SSO) in Your Microsoft Teams Bot App [Part II]

2
Comments
5 min read
How to remove a leaked .env file from GitHub permanently...

How to remove a leaked .env file from GitHub permanently...

89
Comments 23
2 min read
How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

How to install all the tools you need and want in Kali Linux with one command (From top 10 to default to everything)

10
Comments
3 min read
Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security

Authentication vs. Authorization in Azure: Decoding the Dynamic Duo of Security

Comments
2 min read
Boosting Incident Response Capabilities with Azure: A Practical Guide

Boosting Incident Response Capabilities with Azure: A Practical Guide

1
Comments
6 min read
Using reCAPTCHA v3 with Next.js 14

Using reCAPTCHA v3 with Next.js 14

7
Comments 1
3 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

2
Comments
4 min read
Resolve "Blocked by CORS Policy: No 'Access-Control-Allow-Origin'" in Laravel

Resolve "Blocked by CORS Policy: No 'Access-Control-Allow-Origin'" in Laravel

7
Comments 1
4 min read
Security news weekly round-up - 6th September 2024

Security news weekly round-up - 6th September 2024

1
Comments
2 min read
Server actions in Next.js

Server actions in Next.js

3
Comments
4 min read
Automated Security Scanning for Docker Images on AWS

Automated Security Scanning for Docker Images on AWS

Comments
14 min read
Introduction to Mastering Authentication

Introduction to Mastering Authentication

4
Comments
5 min read
Polyfills - a filler or a gaping hole? (Part-1)

Polyfills - a filler or a gaping hole? (Part-1)

1
Comments
3 min read
🛡️ Mastering HTTP Security Headers

🛡️ Mastering HTTP Security Headers

20
Comments
8 min read
Types of DNS attacks

Types of DNS attacks

2
Comments
8 min read
Resourcely adds Atlantis Support

Resourcely adds Atlantis Support

Comments
2 min read
Bounty Hunter's Handbook: Practical Tips for Bug Hunting

Bounty Hunter's Handbook: Practical Tips for Bug Hunting

2
Comments
1 min read
Use Terraform module from a private git project with Atlantis

Use Terraform module from a private git project with Atlantis

Comments
2 min read
Afterlife.exe: The Afterlife of Your Digital Footprint

Afterlife.exe: The Afterlife of Your Digital Footprint

3
Comments 2
3 min read
💻 Get started: MongoDB Cluster Infrastructure and Cryptographic Security 💻

💻 Get started: MongoDB Cluster Infrastructure and Cryptographic Security 💻

10
Comments
2 min read
💻 入门: MongoDB 集群基础设施和加密安全 💻

💻 入门: MongoDB 集群基础设施和加密安全 💻

10
Comments
1 min read
A SAML Security Vulnerability Handbook for Developers

A SAML Security Vulnerability Handbook for Developers

Comments
10 min read
🔍🚀 Mastering Network Security: AWS Tools for Detection and Analysis

🔍🚀 Mastering Network Security: AWS Tools for Detection and Analysis

Comments
2 min read
Certificados RSA e a Segurança na 3XPay

Certificados RSA e a Segurança na 3XPay

Comments
4 min read
Building a Cybersecurity Assistant using Lyzr SDK

Building a Cybersecurity Assistant using Lyzr SDK

Comments
3 min read
Best Practices for Managing Terraform State Files: A Complete Guide

Best Practices for Managing Terraform State Files: A Complete Guide

4
Comments
6 min read
Secure Multifunctional Nginx Reverse Proxy

Secure Multifunctional Nginx Reverse Proxy

Comments
1 min read
Dart-Powered Firebase Security: Exploring Flood's Drop and Automate Modules

Dart-Powered Firebase Security: Exploring Flood's Drop and Automate Modules

Comments
5 min read
loading...