DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AWS Security Group vs NACL: What’s the Difference?

AWS Security Group vs NACL: What’s the Difference?

1
Comments
2 min read
Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

1
Comments
9 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
New tools for effortless policy creation and testing in Cerbos Hub

New tools for effortless policy creation and testing in Cerbos Hub

Comments
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

4
Comments
4 min read
Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

Essential AWS Security Services to Safeguard Your AWS Cloud Workloads

5
Comments 1
4 min read
Identity Management: The Foundation for Security Implementation

Identity Management: The Foundation for Security Implementation

8
Comments 1
5 min read
AI Security: How to Protect Your Projects with Hardened ModelKits

AI Security: How to Protect Your Projects with Hardened ModelKits

45
Comments
7 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

1
Comments
3 min read
Storing passwords safely (C#)

Storing passwords safely (C#)

54
Comments 26
6 min read
Hacking (and securing) GraphQL

Hacking (and securing) GraphQL

4
Comments
13 min read
Leverage IP Data for Dynamic User Access Management 🌐

Leverage IP Data for Dynamic User Access Management 🌐

42
Comments 1
4 min read
AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

7
Comments
6 min read
Greatly improve your Health Endpoint with these tips!

Greatly improve your Health Endpoint with these tips!

1
Comments
2 min read
The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

The Future of Passwordless Authentication: Are Passwords Becoming Obsolete?

Comments
2 min read
The Dynamic Application Security Testing Process: A Step-by-Step Guide

The Dynamic Application Security Testing Process: A Step-by-Step Guide

Comments
4 min read
Why you should not mistype a website name ?

Why you should not mistype a website name ?

12
Comments
1 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
SSL Pinning in React Native for iOS and Android

SSL Pinning in React Native for iOS and Android

8
Comments
4 min read
Guide to Writing Security Technology Blog Articles

Guide to Writing Security Technology Blog Articles

2
Comments
1 min read
Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

Mastering OSINT for Bug Bounty Success: Advanced Tools and Techniques for Deep Recon

7
Comments
4 min read
Enhancing data security with FIM (file integrity monitoring) 🔐

Enhancing data security with FIM (file integrity monitoring) 🔐

1
Comments
1 min read
How I Secured My Containerized Application Using Anchore (Day 29 Project)

How I Secured My Containerized Application Using Anchore (Day 29 Project)

Comments
3 min read
What Is WebAuthN: A Developer's Guide To WebAuthN

What Is WebAuthN: A Developer's Guide To WebAuthN

Comments
6 min read
Learn about basic Authentication

Learn about basic Authentication

2
Comments
4 min read
Ten Must-Have Endpoint Security Tools for 2025

Ten Must-Have Endpoint Security Tools for 2025

Comments
2 min read
Issue 66 of AWS Cloud Security Weekly

Issue 66 of AWS Cloud Security Weekly

1
Comments
1 min read
K8s Plugins For Solid Security

K8s Plugins For Solid Security

Comments
2 min read
Hidden Risk Of Relying On Labels In Kubernetes Security

Hidden Risk Of Relying On Labels In Kubernetes Security

Comments
2 min read
Whats Information Security?

Whats Information Security?

Comments
1 min read
Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash: A Robust Module for Secure Password Hashing

4
Comments
3 min read
Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

Wordlist Creation: Cracking WPA/WPA2 Codes - A Step-by-Step Guide 🛠️

1
Comments
1 min read
Understanding Git Tags and Checkout

Understanding Git Tags and Checkout

9
Comments 1
7 min read
Automating Vulnerability Detection for Your Assets

Automating Vulnerability Detection for Your Assets

Comments
13 min read
Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

Bitcoin Whale Awakens After 13 Years: What It Means for the Future of Blockchain Analytics and Security

2
Comments
4 min read
🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

🦸 OSS Heroes: Pilcrow, a student who built Lucia - auth library with 9.5k stars on GitHub ⭐ 🇯🇵

137
Comments 9
6 min read
How to Safely Delete Local and Remote Branches in Git

How to Safely Delete Local and Remote Branches in Git

8
Comments 1
5 min read
Bypassing Bot Detection Software with Selenium in Python

Bypassing Bot Detection Software with Selenium in Python

5
Comments
2 min read
TLS vs SSL

TLS vs SSL

Comments
2 min read
Protecting Your Application with CSRF in Lithe

Protecting Your Application with CSRF in Lithe

4
Comments
4 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

3
Comments
14 min read
The Rise of AI in Cybersecurity: Opportunities and Challenges

The Rise of AI in Cybersecurity: Opportunities and Challenges

1
Comments 2
2 min read
Node.js Authentication: Best Practices and Key Strategies

Node.js Authentication: Best Practices and Key Strategies

40
Comments 6
6 min read
Defensive Programming as a Backend Developer: Building Robust and Secure Systems

Defensive Programming as a Backend Developer: Building Robust and Secure Systems

22
Comments 1
11 min read
Understanding "working-directory" in GitHub Actions

Understanding "working-directory" in GitHub Actions

10
Comments
3 min read
Issue 67 of AWS Cloud Security Weekly

Issue 67 of AWS Cloud Security Weekly

1
Comments
1 min read
CornCon X: Powering Cybersecurity Innovation Through Human Connection

CornCon X: Powering Cybersecurity Innovation Through Human Connection

3
Comments 1
8 min read
Streamline Keyper CI/CD Pipeline with Keyper's Github Action

Streamline Keyper CI/CD Pipeline with Keyper's Github Action

1
Comments
4 min read
Advanced JWT Exploitation Techniques: Going Beyond the Basics

Advanced JWT Exploitation Techniques: Going Beyond the Basics

1
Comments
5 min read
Issue 70 of AWS Cloud Security Weekly

Issue 70 of AWS Cloud Security Weekly

3
Comments 2
2 min read
Advanced Container Security Techniques for DevSecOps Pipelines

Advanced Container Security Techniques for DevSecOps Pipelines

1
Comments
6 min read
Addressing The Threat of Deepfakes With Authentic Images

Addressing The Threat of Deepfakes With Authentic Images

Comments
8 min read
Security news weekly round-up - 1st November 2024

Security news weekly round-up - 1st November 2024

1
Comments
4 min read
Automating CI/CD Pipeline Migration with GitHub Actions Importer

Automating CI/CD Pipeline Migration with GitHub Actions Importer

7
Comments
5 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

8
Comments
4 min read
Who is a Hacker?

Who is a Hacker?

7
Comments
8 min read
The Ultimate Guide to Protecting Your Online Privacy in 2024

The Ultimate Guide to Protecting Your Online Privacy in 2024

1
Comments 2
3 min read
Serverless AI powered content moderation service

Serverless AI powered content moderation service

3
Comments
6 min read
Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Comments
3 min read
StatefulSets in Kubernetes

StatefulSets in Kubernetes

7
Comments
8 min read
loading...