DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Never write a UserService again

Never write a UserService again

3
Comments
10 min read
A simple mistake that leaks 20M users' data

A simple mistake that leaks 20M users' data

2
Comments
2 min read
Signing your commits in git

Signing your commits in git

5
Comments 1
3 min read
Top 9 Joomla Security Vulnerabilities and What You Can Do About Them

Top 9 Joomla Security Vulnerabilities and What You Can Do About Them

2
Comments 2
6 min read
Configuring an isolated network in AWS

Configuring an isolated network in AWS

23
Comments 8
8 min read
Getting a basic grip over Kubernetes Cloud Native Security

Getting a basic grip over Kubernetes Cloud Native Security

4
Comments
2 min read
Designing a defense-in-depth network security model between Amazon Elastic Kubernetes Service and Amazon RDS

Designing a defense-in-depth network security model between Amazon Elastic Kubernetes Service and Amazon RDS

23
Comments
5 min read
Combining IAM Roles for Service Accounts with Pod level Security Groups for a defense-in-depth strategy

Combining IAM Roles for Service Accounts with Pod level Security Groups for a defense-in-depth strategy

14
Comments 1
10 min read
Solving Chatbot-Based User Authentication 🔑: Introducing NoPass.me

Solving Chatbot-Based User Authentication 🔑: Introducing NoPass.me

6
Comments
4 min read
Securing sensitive Data in amazon RDS

Securing sensitive Data in amazon RDS

8
Comments 1
7 min read
Different typosquatting attacks to know of - for a secure supply chain

Different typosquatting attacks to know of - for a secure supply chain

12
Comments
5 min read
Adding two-factor authentication to your iOS app using TypingDNA

Adding two-factor authentication to your iOS app using TypingDNA

6
Comments
9 min read
Database Security Checklist for Small Teams

Database Security Checklist for Small Teams

103
Comments
15 min read
Alice and Bob Learn: Chapter Discussions

Alice and Bob Learn: Chapter Discussions

5
Comments
2 min read
HSTS (HTTP Strict Transport Security) - A buddy to HTTPS 🛡️

HSTS (HTTP Strict Transport Security) - A buddy to HTTPS 🛡️

6
Comments
8 min read
AWS Chatbot to the rescue: never miss an AWS Security alert

AWS Chatbot to the rescue: never miss an AWS Security alert

21
Comments
3 min read
How to install and use Maldet (Linux Malware Detect)

How to install and use Maldet (Linux Malware Detect)

7
Comments
6 min read
Decoding Django Sessions in PostgreSQL

Decoding Django Sessions in PostgreSQL

9
Comments
6 min read
Security news weekly round-up - 19th March 2021

Security news weekly round-up - 19th March 2021

4
Comments
3 min read
Self-Signed SSL: NGINX on MAC

Self-Signed SSL: NGINX on MAC

8
Comments
2 min read
bunkerized-nginx - make your web apps and APIs secured by default

bunkerized-nginx - make your web apps and APIs secured by default

19
Comments
8 min read
Performance and security testing. Why bother?

Performance and security testing. Why bother?

2
Comments
12 min read
CloudStick - Server Management Tool

CloudStick - Server Management Tool

5
Comments
3 min read
[VIDEO] Building A Gamified CTF Platform | Devlog #1

[VIDEO] Building A Gamified CTF Platform | Devlog #1

2
Comments
1 min read
GitHub Actions HTTP security with Mozilla Observatory

GitHub Actions HTTP security with Mozilla Observatory

8
Comments
1 min read
The Hidden Cost of 500 Internal Server Error

The Hidden Cost of 500 Internal Server Error

7
Comments
4 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

20
Comments 2
1 min read
PentesterLab: File Include

PentesterLab: File Include

8
Comments
2 min read
Multi-Tenant Analytics with Auth0 and Cube.js 🔐 — the Complete Guide

Multi-Tenant Analytics with Auth0 and Cube.js 🔐 — the Complete Guide

153
Comments
19 min read
Authentication with Kong's JWT Plugin

Authentication with Kong's JWT Plugin

11
Comments
10 min read
Securing An Express Application

Securing An Express Application

52
Comments
7 min read
Nmap Basics

Nmap Basics

2
Comments
1 min read
Google Cloud: IAM Conditions

Google Cloud: IAM Conditions

7
Comments
3 min read
Which encryption control to choose for your app protection, by Anastasiia Voitova 02:28

Which encryption control to choose for your app protection, by Anastasiia Voitova

4
Comments
1 min read
How CTFs Landed Me A Job As An Offensive Security Engineer

How CTFs Landed Me A Job As An Offensive Security Engineer

5
Comments
4 min read
Is GitHub Safe to Use?

Is GitHub Safe to Use?

9
Comments
1 min read
Enforce MFA on the Azure Portal using Conditional Access

Enforce MFA on the Azure Portal using Conditional Access

9
Comments
3 min read
OWASP Top 10 for Developers: Insufficient Logging and Monitoring

OWASP Top 10 for Developers: Insufficient Logging and Monitoring

2
Comments
6 min read
Cultivating a Security Focused Development Team

Cultivating a Security Focused Development Team

4
Comments
7 min read
Configuring Azure VM’s security groups to allow web-access via your web browser.

Configuring Azure VM’s security groups to allow web-access via your web browser.

4
Comments
3 min read
Use GoAccess To Analyze HAProxy Logs

Use GoAccess To Analyze HAProxy Logs

11
Comments
4 min read
The Complete Guide to Angular Security

The Complete Guide to Angular Security

10
Comments
1 min read
How to make the Firebase Realtime Database Rules Secure for a Blog

How to make the Firebase Realtime Database Rules Secure for a Blog

7
Comments 2
3 min read
How I exploited NPM downloads... and why you shouldn't trust them

How I exploited NPM downloads... and why you shouldn't trust them

115
Comments 12
5 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

83
Comments
10 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

12
Comments
12 min read
A privacy guide for the data tracking era

A privacy guide for the data tracking era

8
Comments 1
5 min read
Simplified: Authentication & Authorization

Simplified: Authentication & Authorization

5
Comments
1 min read
Hardening and Simplifying Python's urlopen

Hardening and Simplifying Python's urlopen

5
Comments
4 min read
How to use UUIDs in URLs in Laravel

How to use UUIDs in URLs in Laravel

11
Comments 3
2 min read
How To Generate Strong Passwords Using Python

How To Generate Strong Passwords Using Python

30
Comments 5
2 min read
Subdomain Takeover: Ignore This Vulnerability at Your Peril

Subdomain Takeover: Ignore This Vulnerability at Your Peril

9
Comments
11 min read
Using environment files in Django

Using environment files in Django

5
Comments 2
5 min read
Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

Email Encryption: What it is, How Does It Work, and How to Encrypt an Email

5
Comments 2
6 min read
Microservices End to End In-transit Encryption on EKS with Istio & ACM

Microservices End to End In-transit Encryption on EKS with Istio & ACM

11
Comments 1
6 min read
rego.fyi: A Study in Serverless Authorization with Open Policy Agent

rego.fyi: A Study in Serverless Authorization with Open Policy Agent

16
Comments 3
11 min read
The ultimate guide to Yubikey on WSL2 [Part 4]

The ultimate guide to Yubikey on WSL2 [Part 4]

8
Comments 4
2 min read
Generate AWS Temporary Credential And Add It As A Profile

Generate AWS Temporary Credential And Add It As A Profile

5
Comments
2 min read
File Encrypter and Decrypter

File Encrypter and Decrypter

7
Comments
3 min read
DevOps Engineer Resume: Here's mine as an example

DevOps Engineer Resume: Here's mine as an example

23
Comments
5 min read
loading...