DEV Community

loading...

# security

👋 Sign in for the ability sort posts by top and latest.
Finding Time For Security When Scaling w/ Liran Tal

Finding Time For Security When Scaling w/ Liran Tal

Reactions 6 Comments
1 min read
Diving Into DevSecOps (Part 2) w/ John Willis

Diving Into DevSecOps (Part 2) w/ John Willis

Reactions 6 Comments
1 min read
Serverless Computing: Security And Challenges

Serverless Computing: Security And Challenges

Reactions 3 Comments
2 min read
Diving Into DevSecOps (Part 1) w/ John Willis

Diving Into DevSecOps (Part 1) w/ John Willis

Reactions 7 Comments
1 min read
An introduction to cryptography in distributed ledger technology

An introduction to cryptography in distributed ledger technology

Reactions 6 Comments
4 min read
Cross site scripting(XSS) in 10 mins

Cross site scripting(XSS) in 10 mins

Reactions 3 Comments
4 min read
Windows Security Alert: Disable Print Spooler

Windows Security Alert: Disable Print Spooler

Reactions 5 Comments
1 min read
So what exactly are AWS Nitro Enclaves?

So what exactly are AWS Nitro Enclaves?

Reactions 7 Comments
7 min read
Wault: The future of password managers

Wault: The future of password managers

Reactions 12 Comments 4
2 min read
Writeup: HackTheBox Shocker- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Shocker- Without Metasploit (OSCP Prep)

Reactions 2 Comments 1
4 min read
7 ways to stop spam on your website

7 ways to stop spam on your website

Reactions 2 Comments
6 min read
Active Record Encryption in Rails 7

Active Record Encryption in Rails 7

Reactions 7 Comments 1
11 min read
Run creat-react-app with HTTPS

Run creat-react-app with HTTPS

Reactions 7 Comments
2 min read
XSS - are you sure you are protected?

XSS - are you sure you are protected?

Reactions 6 Comments
1 min read
Primeiros passos com self-hosting

Primeiros passos com self-hosting

Reactions 7 Comments
16 min read
Top app security practices to expect from developers

Top app security practices to expect from developers

Reactions 6 Comments
3 min read
Do you need help with your npm audit?

Do you need help with your npm audit?

Reactions 28 Comments
3 min read
Losing poor habits with forms

Losing poor habits with forms

Reactions 7 Comments
3 min read
IvyFinal CTF (Crypto 3) - Silly 400 - points

IvyFinal CTF (Crypto 3) - Silly 400 - points

Reactions 5 Comments
2 min read
Implementing a forgot password flow (with pseudo code)

Implementing a forgot password flow (with pseudo code)

Reactions 5 Comments
7 min read
The Most Effective Way to Protect Client-Side JavaScript Applications

The Most Effective Way to Protect Client-Side JavaScript Applications

Reactions 4 Comments
9 min read
Detect and stop 404 attacks with fail2ban

Detect and stop 404 attacks with fail2ban

Reactions 4 Comments
3 min read
Creating CRUD for customer data vs using open-source Databunker tool

Creating CRUD for customer data vs using open-source Databunker tool

Reactions 5 Comments
2 min read
Secure your API Gateway APIs with Auth0

Secure your API Gateway APIs with Auth0

Reactions 5 Comments
8 min read
S3 Same-Region Replication (SRR) vs Cross-Region Replication (CRR)

S3 Same-Region Replication (SRR) vs Cross-Region Replication (CRR)

Reactions 3 Comments
2 min read
Managing Secrets in Node.js with HashiCorp Vault

Managing Secrets in Node.js with HashiCorp Vault

Reactions 5 Comments
7 min read
Accept header parser and matcher

Accept header parser and matcher

Reactions 4 Comments
4 min read
IvyFinal CTF (Crypto 2) - HeadCracker 300 - points

IvyFinal CTF (Crypto 2) - HeadCracker 300 - points

Reactions 3 Comments
4 min read
TryHackMe OhSINT

TryHackMe OhSINT

Reactions 3 Comments
2 min read
IvyFinal CTF (Crypto 1) - Warmup 50 points

IvyFinal CTF (Crypto 1) - Warmup 50 points

Reactions 2 Comments
1 min read
Integridade de sub-recursos (SRI)

Integridade de sub-recursos (SRI)

Reactions 5 Comments
5 min read
Codecov supply chain attack - Step by step breakdown

Codecov supply chain attack - Step by step breakdown

Reactions 7 Comments
7 min read
How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

How Armory’s Policy Engine can Improve our Nation’s Cybersecurity

Reactions 2 Comments
8 min read
Azure Update Management

Azure Update Management

Reactions 4 Comments
3 min read
Automate server intrusion detection and banning with Fail2ban

Automate server intrusion detection and banning with Fail2ban

Reactions 8 Comments
4 min read
WAF for ALBs

WAF for ALBs

Reactions 6 Comments
2 min read
Top 10 React Tricks Every Developer Should Use

Top 10 React Tricks Every Developer Should Use

Reactions 207 Comments 1
5 min read
Backup and Recovery Security Standards

Backup and Recovery Security Standards

Reactions 2 Comments
5 min read
How to Convert LV or MD RAID1 and 0 Into RAID5 Without Losing Data

How to Convert LV or MD RAID1 and 0 Into RAID5 Without Losing Data

Reactions 4 Comments
7 min read
Exploit Website Databases Using SQLmap

Exploit Website Databases Using SQLmap

Reactions 2 Comments
2 min read
TryHackMe TShark

TryHackMe TShark

Reactions 2 Comments
2 min read
Security news weekly round-up - 25th June 2021

Security news weekly round-up - 25th June 2021

Reactions 6 Comments
3 min read
GraphQL on Azure: Part 7 - Server-side Authentication

GraphQL on Azure: Part 7 - Server-side Authentication

Reactions 8 Comments
8 min read
Secure your API Gateway APIs with Auth0

Secure your API Gateway APIs with Auth0

Reactions 10 Comments
8 min read
Generate an SSL Certificate With the Root Certificate for localhost

Generate an SSL Certificate With the Root Certificate for localhost

Reactions 5 Comments
1 min read
Django : ReCaptha Everywhere

Django : ReCaptha Everywhere

Reactions 3 Comments
3 min read
Security news weekly round-up - 4th June 2021

Security news weekly round-up - 4th June 2021

Reactions 2 Comments
4 min read
Process Injection (Process Hollowing)

Process Injection (Process Hollowing)

Reactions 7 Comments
13 min read
Top 5 Password managers for Mac

Top 5 Password managers for Mac

Reactions 5 Comments 6
2 min read
Amazon EKS Security Assessment - Kube Bench

Amazon EKS Security Assessment - Kube Bench

Reactions 9 Comments
5 min read
Protect secrets in Azure Functions using Key Vault

Protect secrets in Azure Functions using Key Vault

Reactions 10 Comments
5 min read
Top 11 Email Security Risks in 2021

Top 11 Email Security Risks in 2021

Reactions 1 Comments
5 min read
Using Kyverno To Enforce EKS Best Practices

Using Kyverno To Enforce EKS Best Practices

Reactions 12 Comments
5 min read
3 Ways to Store and Read Credentials Locally in Python

3 Ways to Store and Read Credentials Locally in Python

Reactions 2 Comments
4 min read
10 Tips for Safe and Secure Remote Work for Developers

10 Tips for Safe and Secure Remote Work for Developers

Reactions 7 Comments
7 min read
Comparing Popular Static Application Security Testing (SAST) Tools

Comparing Popular Static Application Security Testing (SAST) Tools

Reactions 3 Comments 3
5 min read
Securing a Serverless Multi-Tenancy Puppeteer Service

Securing a Serverless Multi-Tenancy Puppeteer Service

Reactions 2 Comments
3 min read
Deep Dive: Multi-Factor Authentication with .NET 5

Deep Dive: Multi-Factor Authentication with .NET 5

Reactions 16 Comments 3
6 min read
Secure Python console apps with Azure AD

Secure Python console apps with Azure AD

Reactions 7 Comments
7 min read
IoT Security: What Your Business Needs to Know

IoT Security: What Your Business Needs to Know

Reactions 3 Comments
4 min read
loading...
Forem Open with the Forem app