DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How To Implement AWS SSB Controls in Terraform - Part 4

How To Implement AWS SSB Controls in Terraform - Part 4

2
Comments
11 min read
Identity and Access Management (IAM)

Identity and Access Management (IAM)

Comments
2 min read
Exploring FAPI 2.0: The Latest in API Security Technology

Exploring FAPI 2.0: The Latest in API Security Technology

1
Comments
32 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
The ROI of paying open source maintainers (in light of the xz utils backdoor)

The ROI of paying open source maintainers (in light of the xz utils backdoor)

1
Comments 1
7 min read
Azure Managed Identities: No more secrets

Azure Managed Identities: No more secrets

1
Comments
4 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Enhancing API Security: Best Practices for Developers

Enhancing API Security: Best Practices for Developers

2
Comments 2
2 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
Analyzing Software Supply Chain Security with Graph Analytics

Analyzing Software Supply Chain Security with Graph Analytics

Comments
1 min read
"Keep everything online"

"Keep everything online"

Comments
3 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

2
Comments
3 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
12 Free Courses To Help You Develop More Secure Software - Shift Security Left

12 Free Courses To Help You Develop More Secure Software - Shift Security Left

9
Comments
6 min read
Issue 39 of AWS Cloud Security Weekly

Issue 39 of AWS Cloud Security Weekly

Comments
2 min read
Threat Detection and Management for Beginners

Threat Detection and Management for Beginners

Comments
7 min read
PrivatePing - A Secure Messaging Application

PrivatePing - A Secure Messaging Application

5
Comments
2 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

8
Comments
16 min read
Broken Access Control (IDOR)

Broken Access Control (IDOR)

1
Comments
5 min read
Securing iOS Private and Public Keys with Apple Hardware Technology

Securing iOS Private and Public Keys with Apple Hardware Technology

Comments
1 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
How to generate a secure and robust SSH key in 2024

How to generate a secure and robust SSH key in 2024

13
Comments
2 min read
How to secure an existing SSH key with a passphrase

How to secure an existing SSH key with a passphrase

5
Comments
2 min read
Why using a passphrase to secure your SSH key ?

Why using a passphrase to secure your SSH key ?

8
Comments
2 min read
Integer overflow vulnerabilities in .NET

Integer overflow vulnerabilities in .NET

1
Comments
3 min read
Securing the Cloud #25

Securing the Cloud #25

Comments
4 min read
Infrastructure protection on AWS for Beginners

Infrastructure protection on AWS for Beginners

Comments
7 min read
🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

🔐 Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! 🔐

Comments
2 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

1
Comments
7 min read
How to Monitor and Protect Your Google Activity History

How to Monitor and Protect Your Google Activity History

Comments
9 min read
Understanding Firewalls: Your First Line of Cyber Defense

Understanding Firewalls: Your First Line of Cyber Defense

Comments
12 min read
[Adventure to Cybersecurity] Diagram on how DNSSEC work

[Adventure to Cybersecurity] Diagram on how DNSSEC work

Comments
1 min read
Extending legacy healthcare software: RPA technology

Extending legacy healthcare software: RPA technology

10
Comments
4 min read
The Adventures of Blink #17: Continuous Security... DevSecOps!

The Adventures of Blink #17: Continuous Security... DevSecOps!

Comments
5 min read
7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

16
Comments
4 min read
Hacking WiFi 101: basic concepts, terminology, and a real-life example

Hacking WiFi 101: basic concepts, terminology, and a real-life example

1
Comments
6 min read
Common Security Vulnerabilities in the Blockchain World

Common Security Vulnerabilities in the Blockchain World

1
Comments
4 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

7
Comments
4 min read
Activity Monitoring and Audit in AWS

Activity Monitoring and Audit in AWS

Comments
5 min read
Rethinking password security: say goodbye to plaintext passwords

Rethinking password security: say goodbye to plaintext passwords

3
Comments 3
5 min read
Key derivation in .NET using HKDF

Key derivation in .NET using HKDF

Comments
3 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Improving user experience with passwordless authentication

Improving user experience with passwordless authentication

4
Comments
5 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

Comments
2 min read
All You Need To Know To Secure Your Data From Phishing

All You Need To Know To Secure Your Data From Phishing

6
Comments
4 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
Power Platform - DLP Policies

Power Platform - DLP Policies

19
Comments 1
6 min read
Social media authentication: convenience vs privacy

Social media authentication: convenience vs privacy

1
Comments
5 min read
Advanced Analytics and Monitoring in Cyber Threat Detection

Advanced Analytics and Monitoring in Cyber Threat Detection

1
Comments
2 min read
10 Creative Ways to Use Social Media for Recruitment

10 Creative Ways to Use Social Media for Recruitment

1
Comments
3 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
Next.js authentication using Clerk, Drizzle ORM, and Neon

Next.js authentication using Clerk, Drizzle ORM, and Neon

1
Comments
10 min read
How to restrict default access to KMS via key policy with Terraform

How to restrict default access to KMS via key policy with Terraform

6
Comments 1
4 min read
Bridging Code and Security: Unveiling the Power of DevSecOps

Bridging Code and Security: Unveiling the Power of DevSecOps

6
Comments
13 min read
How Can AWS IAM Access Analyzer Help You Improve Security Checks in Your CI/CD Pipeline?

How Can AWS IAM Access Analyzer Help You Improve Security Checks in Your CI/CD Pipeline?

3
Comments
6 min read
Take the pain to learn user authentication before you use an external provider

Take the pain to learn user authentication before you use an external provider

8
Comments 3
6 min read
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCEs

1
Comments
1 min read
loading...