DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to write an effective cloud security guideline

How to write an effective cloud security guideline

6
Comments
4 min read
Mobile Security Framework (MobSF) for automated Mobile security testing

Mobile Security Framework (MobSF) for automated Mobile security testing

12
Comments
2 min read
OpenBSD httpd: Basic authentication with htpasswd

OpenBSD httpd: Basic authentication with htpasswd

6
Comments
1 min read
Security news weekly round-up - 30th July 2021

Security news weekly round-up - 30th July 2021

2
Comments
4 min read
Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

Azure DevOps: Limit User Visibility and Collaboration to Specific Projects

4
Comments 1
3 min read
Protect Your SignalR Service Based Real-time Application with Application Gateway

Protect Your SignalR Service Based Real-time Application with Application Gateway

17
Comments 10
6 min read
Openssl by Example

Openssl by Example

5
Comments
1 min read
Cross-site scripting (XSS) attack - part 3

Cross-site scripting (XSS) attack - part 3

8
Comments
4 min read
Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

Solidity Security: The Significance of CHECK-EFFECTS-INTERACTION Pattern in Smart Contracts

14
Comments
2 min read
JP in da Kyiv, and crypto R&D internship pre-announcement

JP in da Kyiv, and crypto R&D internship pre-announcement

5
Comments
2 min read
Authenticating Event Hubs publishers with SAS Token

Authenticating Event Hubs publishers with SAS Token

6
Comments
4 min read
The 10 most in-demand roles in the Information Security domain

The 10 most in-demand roles in the Information Security domain

6
Comments
2 min read
Delete all users in an Azure AD Tenant programmatically

Delete all users in an Azure AD Tenant programmatically

8
Comments
4 min read
Delete an Azure AD B2C tenant programmatically

Delete an Azure AD B2C tenant programmatically

8
Comments
2 min read
Let's Make a Security Camera using your smartphone [2021]

Let's Make a Security Camera using your smartphone [2021]

3
Comments 1
1 min read
Who's responsible for securing software?

Who's responsible for securing software?

3
Comments
2 min read
AWS: Route53 Private Hosted Zones — hiding domains from the Internet

AWS: Route53 Private Hosted Zones — hiding domains from the Internet

2
Comments
4 min read
Stealthy Code Injection in a Running .NET Process

Stealthy Code Injection in a Running .NET Process

12
Comments
8 min read
Securing Azure SignalR +Azure App Service - Part 4

Securing Azure SignalR +Azure App Service - Part 4

3
Comments 1
2 min read
Pentesting detection on EDR

Pentesting detection on EDR

19
Comments
2 min read
What is a security champion and do you need one?

What is a security champion and do you need one?

2
Comments
3 min read
2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

2 Widespread Attacks on Your Containerized Environment and 7 Rules to Prevent it.

3
Comments
7 min read
Cross-site scripting (XSS) attack - Part 2

Cross-site scripting (XSS) attack - Part 2

27
Comments
4 min read
Landing Zones, Organizations, OUs and Multi-Account Environments

Landing Zones, Organizations, OUs and Multi-Account Environments

14
Comments 1
5 min read
Secure Open API (Swagger) calls with Azure Active Directory

Secure Open API (Swagger) calls with Azure Active Directory

19
Comments 11
3 min read
Updates for SQL Injection in Rails 6.1

Updates for SQL Injection in Rails 6.1

11
Comments
3 min read
How to approach DevSecOps security automation

How to approach DevSecOps security automation

4
Comments
4 min read
Installing Krypt.co on NVIDIA Jetson Nano

Installing Krypt.co on NVIDIA Jetson Nano

3
Comments
4 min read
Verifying JWTs with JWKS in Ruby

Verifying JWTs with JWKS in Ruby

3
Comments
5 min read
How to set GitHub Actions's `permissions`?

How to set GitHub Actions's `permissions`?

10
Comments 1
2 min read
Cross-site scripting (XSS) attack - Part 1

Cross-site scripting (XSS) attack - Part 1

80
Comments
4 min read
More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

More security thanks to micro-learning and gamification – Secure Code Warrior plugin for SCM-Manager

2
Comments
4 min read
On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

On-Demand Video Streaming! AWS Elemental MediaConvert and AWS Lambda

21
Comments 35
8 min read
Passman - a password manager for the command line

Passman - a password manager for the command line

2
Comments
1 min read
How to add a login form to any website, without a single line of code

How to add a login form to any website, without a single line of code

5
Comments
6 min read
AWS: Web Application Firewall overview, configuration, and its monitoring

AWS: Web Application Firewall overview, configuration, and its monitoring

8
Comments
16 min read
Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

Anonymise yourself! How to set up tor in mac? In the terminal - noob_sec series

14
Comments
4 min read
Managing remote servers with SSH and SFTP connections: a step-by-step guide

Managing remote servers with SSH and SFTP connections: a step-by-step guide

14
Comments
12 min read
Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

Using Open Source Tools at Your Company w/ Doron Gill of Logz.io

5
Comments
1 min read
IvyFinal CTF (Crypto 3) - Silly 400 - points

IvyFinal CTF (Crypto 3) - Silly 400 - points

5
Comments
2 min read
Top Information Gathering Methods Explained

Top Information Gathering Methods Explained

3
Comments
4 min read
Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

Getting Started with AWS Config, CloudTrail, CloudWatch, S3, SNS

17
Comments
6 min read
Security news weekly round-up - 16th July 2021

Security news weekly round-up - 16th July 2021

2
Comments
3 min read
Istio Authentication & Authorization

Istio Authentication & Authorization

3
Comments 1
6 min read
The Limits of Automation w/ Judy Johnson

The Limits of Automation w/ Judy Johnson

8
Comments 1
1 min read
Application Layer DDoS Attacks

Application Layer DDoS Attacks

6
Comments
2 min read
Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

Adding Google Auth to Kubernetes Clusters with Red Hat OpenShift and IBM AppID

4
Comments
2 min read
How to verify your commits on GitHub

How to verify your commits on GitHub

71
Comments 4
4 min read
Firebase Auth | Understanding The Auth

Firebase Auth | Understanding The Auth

41
Comments 1
2 min read
Securing React Native Application

Securing React Native Application

75
Comments 2
9 min read
How to securely send/receive key params in an .NET Core WebAPI and Javascript Application

How to securely send/receive key params in an .NET Core WebAPI and Javascript Application

6
Comments
3 min read
10 Steps To Secure Your Cloud

10 Steps To Secure Your Cloud

80
Comments 3
6 min read
So what *is* privacy? (In the context of privacy tech)

So what *is* privacy? (In the context of privacy tech)

5
Comments
6 min read
Digital certificates and what they do

Digital certificates and what they do

7
Comments
1 min read
secretlint can mask the secrets

secretlint can mask the secrets

5
Comments
1 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

107
Comments 7
4 min read
How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

2
Comments
8 min read
Encryption without passwords

Encryption without passwords

13
Comments
6 min read
Keycloak for Local Development

Keycloak for Local Development

6
Comments
5 min read
Understanding HTTPS

Understanding HTTPS

3
Comments
3 min read
loading...