DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Are hackers watching your screen right now?

Are hackers watching your screen right now?

18
Comments 1
3 min read
SQL Injection Isn't Dead Yet

SQL Injection Isn't Dead Yet

11
Comments
6 min read
Authentication using JSON Web Tokens.

Authentication using JSON Web Tokens.

8
Comments
4 min read
Issue 40 of AWS Cloud Security Weekly

Issue 40 of AWS Cloud Security Weekly

7
Comments
3 min read
Recent Rust Security Advisory: CVE-2024-24576

Recent Rust Security Advisory: CVE-2024-24576

7
Comments
2 min read
Enhance Your Web Protection: AWS WAF Essentials

Enhance Your Web Protection: AWS WAF Essentials

7
Comments
11 min read
Securely Containerize a Python Application with Chainguard Images

Securely Containerize a Python Application with Chainguard Images

6
Comments
7 min read
🔐Simple Yet Crucial step to avoid security incidents💡

🔐Simple Yet Crucial step to avoid security incidents💡

5
Comments
1 min read
Boost Threat Detection with Amazon GuardDuty & Inspector

Boost Threat Detection with Amazon GuardDuty & Inspector

5
Comments
4 min read
Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

Bringing Security to the Forefront of DevOps: The Power of Threat Intelligence Integration

5
Comments
3 min read
Protect API Gateway with Amazon Verified Permissions

Protect API Gateway with Amazon Verified Permissions

3
Comments
8 min read
Enhancing API Security: Best Practices for Developers

Enhancing API Security: Best Practices for Developers

2
Comments 2
2 min read
How To Implement AWS SSB Controls in Terraform - Part 4

How To Implement AWS SSB Controls in Terraform - Part 4

2
Comments
11 min read
Security news weekly round-up - 12th April 2024

Security news weekly round-up - 12th April 2024

1
Comments
3 min read
Gerenciando informações e eventos de segurança - SIEM

Gerenciando informações e eventos de segurança - SIEM

1
Comments
3 min read
Beyond the login screen

Beyond the login screen

1
Comments
5 min read
Should We Stop Now? Assessing the Future Threat of AI

Should We Stop Now? Assessing the Future Threat of AI

1
Comments
4 min read
Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery (CSRF)

1
Comments
3 min read
Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

Secure your Game with Unity Game Shield - An open-source anti-cheat and encryption toolkit

1
Comments
6 min read
The ROI of paying open source maintainers (in light of the xz utils backdoor)

The ROI of paying open source maintainers (in light of the xz utils backdoor)

1
Comments 1
7 min read
Azure Managed Identities: No more secrets

Azure Managed Identities: No more secrets

1
Comments
4 min read
The State of Secrets Sprawl 2024

The State of Secrets Sprawl 2024

1
Comments
2 min read
Better Threat Detection with CloudWatch Logs and Generative AI

Better Threat Detection with CloudWatch Logs and Generative AI

1
Comments
6 min read
Use CloudWatch LogGroups for EC2 logging

Use CloudWatch LogGroups for EC2 logging

1
Comments
5 min read
Exploring FAPI 2.0: The Latest in API Security Technology

Exploring FAPI 2.0: The Latest in API Security Technology

1
Comments
32 min read
The best SWEs need SCA

The best SWEs need SCA

Comments
2 min read
"Keep everything online"

"Keep everything online"

Comments
3 min read
Locally test and validate your Renovate configuration files

Locally test and validate your Renovate configuration files

Comments
3 min read
Why Regular IT Infrastructure Audits Are Essential

Why Regular IT Infrastructure Audits Are Essential

Comments
3 min read
Analyzing Software Supply Chain Security with Graph Analytics

Analyzing Software Supply Chain Security with Graph Analytics

Comments
1 min read
TECNO Security Author Program: Come and share your security research and bug bounty practices!

TECNO Security Author Program: Come and share your security research and bug bounty practices!

Comments
1 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Staying HIPAA Compliant With Virtual Desktops

Staying HIPAA Compliant With Virtual Desktops

Comments
6 min read
Identity and Access Management (IAM)

Identity and Access Management (IAM)

Comments
2 min read
Exploring Tectonites: Understanding Earthquakes and Planetary Tectonics

Exploring Tectonites: Understanding Earthquakes and Planetary Tectonics

Comments
3 min read
Securing Your Web Application with AWS WAF and AWS Shield

Securing Your Web Application with AWS WAF and AWS Shield

Comments
5 min read
Enhancing AWS Monitoring for Improved Threat Management

Enhancing AWS Monitoring for Improved Threat Management

Comments
2 min read
Don't Keep Up with AI!

Don't Keep Up with AI!

Comments
18 min read
Data Privacy in API Integrations

Data Privacy in API Integrations

Comments
5 min read
Securing the Cloud #26

Securing the Cloud #26

Comments
3 min read
6 security advancements that Plang offers for the user

6 security advancements that Plang offers for the user

Comments
2 min read
What happens when you type https://www.google.com in your browser and press Enter?

What happens when you type https://www.google.com in your browser and press Enter?

Comments
4 min read
Taming misconfiguration chaos with Resourcely

Taming misconfiguration chaos with Resourcely

Comments
1 min read
Self-Paced Online Training for Cyber Security with Expert Support

Self-Paced Online Training for Cyber Security with Expert Support

Comments
3 min read
Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Navigating the XZ Utils Security Vulnerability: A Comprehensive Guide

Comments
2 min read
Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Atlanta Cloud Conference 2024: Responsible AI Use And Securing Cloud Deployments

Comments
7 min read
loading...