DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Authenticating Event Hubs publishers with SAS Token

Authenticating Event Hubs publishers with SAS Token

6
Comments
4 min read
The 10 most in-demand roles in the Information Security domain

The 10 most in-demand roles in the Information Security domain

6
Comments
2 min read
Delete all users in an Azure AD Tenant programmatically

Delete all users in an Azure AD Tenant programmatically

8
Comments
4 min read
Delete an Azure AD B2C tenant programmatically

Delete an Azure AD B2C tenant programmatically

8
Comments
2 min read
Let's Make a Security Camera using your smartphone [2021]

Let's Make a Security Camera using your smartphone [2021]

3
Comments 1
1 min read
Who's responsible for securing software?

Who's responsible for securing software?

3
Comments
2 min read
AWS: Route53 Private Hosted Zones — hiding domains from the Internet

AWS: Route53 Private Hosted Zones — hiding domains from the Internet

2
Comments
4 min read
Stealthy Code Injection in a Running .NET Process

Stealthy Code Injection in a Running .NET Process

12
Comments
8 min read
Securing Azure SignalR +Azure App Service - Part 4

Securing Azure SignalR +Azure App Service - Part 4

3
Comments 1
2 min read
Pentesting detection on EDR

Pentesting detection on EDR

19
Comments
2 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

3
Comments
7 min read
Cross-site scripting (XSS) attack - Part 2

Cross-site scripting (XSS) attack - Part 2

27
Comments
4 min read
Landing Zones, Organizations, OUs and Multi-Account Environments

Landing Zones, Organizations, OUs and Multi-Account Environments

14
Comments 1
5 min read
Secure Open API (Swagger) calls with Azure Active Directory

Secure Open API (Swagger) calls with Azure Active Directory

18
Comments 11
3 min read
Updates for SQL Injection in Rails 6.1

Updates for SQL Injection in Rails 6.1

11
Comments
3 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Installing Krypt.co on NVIDIA Jetson Nano

Installing Krypt.co on NVIDIA Jetson Nano

3
Comments
4 min read
Verifying JWTs with JWKS in Ruby

Verifying JWTs with JWKS in Ruby

3
Comments
5 min read
How to set GitHub Actions's `permissions`?

How to set GitHub Actions's `permissions`?

10
Comments 1
2 min read
Cross-site scripting (XSS) attack - Part 1

Cross-site scripting (XSS) attack - Part 1

80
Comments
4 min read
More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

2
Comments
4 min read
On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

20
Comments 35
8 min read
Passman - a password manager for the command line

Passman - a password manager for the command line

2
Comments
1 min read
How to add a login form to any website, without a single line of code

How to add a login form to any website, without a single line of code

5
Comments
6 min read
AWS: Web Application Firewall overview, configuration, and its monitoring

AWS: Web Application Firewall overview, configuration, and its monitoring

8
Comments
16 min read
Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

14
Comments
4 min read
Managing remote servers with SSH and SFTP connections: a step-by-step guide

Managing remote servers with SSH and SFTP connections: a step-by-step guide

14
Comments
12 min read
Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

5
Comments
1 min read
IvyFinal CTF (Crypto 3) - Silly 400 - points

IvyFinal CTF (Crypto 3) - Silly 400 - points

5
Comments
2 min read
Top Information Gathering Methods Explained

Top Information Gathering Methods Explained

3
Comments
4 min read
Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

17
Comments
6 min read
Security news weekly round-up - 16th July 2021

Security news weekly round-up - 16th July 2021

2
Comments
3 min read
Istio Authentication & Authorization

Istio Authentication & Authorization

3
Comments 1
6 min read
The Limits of Automation w/ Judy Johnson

The Limits of Automation w/ Judy Johnson

8
Comments 1
1 min read
Application Layer DDoS Attacks

Application Layer DDoS Attacks

6
Comments
2 min read
Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

4
Comments
2 min read
How to verify your commits on GitHub

How to verify your commits on GitHub

71
Comments 4
4 min read
Firebase Auth | Understanding The Auth

Firebase Auth | Understanding The Auth

41
Comments 1
2 min read
Securing React Native Application

Securing React Native Application

75
Comments 2
9 min read
How to securely send/receive key params in an .NET Core WebAPI and Javascript Application

How to securely send/receive key params in an .NET Core WebAPI and Javascript Application

6
Comments
3 min read
10 Steps To Secure Your Cloud

10 Steps To Secure Your Cloud

80
Comments 3
6 min read
So what *is* privacy? (In the context of privacy tech)

So what *is* privacy? (In the context of privacy tech)

5
Comments
6 min read
Digital certificates and what they do

Digital certificates and what they do

7
Comments
1 min read
secretlint can mask the secrets

secretlint can mask the secrets

5
Comments
1 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

107
Comments 7
4 min read
How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

2
Comments
8 min read
Encryption without passwords

Encryption without passwords

13
Comments
6 min read
Keycloak for Local Development

Keycloak for Local Development

6
Comments
5 min read
Understanding HTTPS

Understanding HTTPS

3
Comments
3 min read
Finding Time For Security When Scaling w/ Liran Tal

Finding Time For Security When Scaling w/ Liran Tal

10
Comments
1 min read
So what exactly are AWS Nitro Enclaves?

So what exactly are AWS Nitro Enclaves?

10
Comments
7 min read
Top 10 React Tricks Every Developer Should Use

Top 10 React Tricks Every Developer Should Use

221
Comments 1
5 min read
Anonymize your data using Amazon S3 Object Lambda

Anonymize your data using Amazon S3 Object Lambda

7
Comments
5 min read
Wault: The future of password managers

Wault: The future of password managers

13
Comments 8
2 min read
Writeup: HackTheBox Shocker- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Shocker- Without Metasploit (OSCP Prep)

6
Comments 1
4 min read
Diving Into DevSecOps (Part 2) w/ John Willis

Diving Into DevSecOps (Part 2) w/ John Willis

13
Comments
1 min read
Do you need help with your npm audit?

Do you need help with your npm audit?

35
Comments
3 min read
Serverless Computing: Security And Challenges

Serverless Computing: Security And Challenges

4
Comments
2 min read
Cross site scripting(XSS) in 10 mins

Cross site scripting(XSS) in 10 mins

12
Comments 2
4 min read
loading...