DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Comments
5 min read
DynamoDB now supports resource-based policies. But is that a good idea?

DynamoDB now supports resource-based policies. But is that a good idea?

Comments
5 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

1
Comments
5 min read
Fundamental Concepts in Secure Environments

Fundamental Concepts in Secure Environments

Comments
2 min read
Security news weekly round-up - 22nd March 2024

Security news weekly round-up - 22nd March 2024

1
Comments
3 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
What is JWT ?

What is JWT ?

2
Comments
2 min read
WebAuthn Cheat Sheet for Developers

WebAuthn Cheat Sheet for Developers

Comments
2 min read
Best Practices for Configuring Rate Limits to Prevent DDoS

Best Practices for Configuring Rate Limits to Prevent DDoS

Comments
6 min read
What the heck is SSH

What the heck is SSH

4
Comments
1 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
Compliant infrastructure using infrastructure as code

Compliant infrastructure using infrastructure as code

2
Comments
6 min read
10 Ways To Ensure Successful Mobile App Security

10 Ways To Ensure Successful Mobile App Security

1
Comments
4 min read
Ngrok: Exposing local server on the internet

Ngrok: Exposing local server on the internet

Comments
3 min read
Ask: Static Code Analysis Tools.

Ask: Static Code Analysis Tools.

Comments 2
1 min read
A rant on data breaches

A rant on data breaches

Comments
2 min read
Why adopt passkeys?

Why adopt passkeys?

3
Comments
5 min read
How To Implement AWS SSB Controls in Terraform - Part 2

How To Implement AWS SSB Controls in Terraform - Part 2

3
Comments
9 min read
GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

Comments
5 min read
Introduction to Cryptography in Python

Introduction to Cryptography in Python

Comments
2 min read
Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Comments
2 min read
Finding the Optimal Bcrypt Rounds for Your Machine

Finding the Optimal Bcrypt Rounds for Your Machine

Comments
3 min read
Understanding Bcrypt Rounds: Balancing Security and Performance

Understanding Bcrypt Rounds: Balancing Security and Performance

Comments
2 min read
How is Amazon Web Services ensuring AI is Securely handling Our Data?

How is Amazon Web Services ensuring AI is Securely handling Our Data?

1
Comments
5 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Comments
2 min read
New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Integrate an Audit Trail for NextAuth.js in a few lines of code

Integrate an Audit Trail for NextAuth.js in a few lines of code

Comments
3 min read
SecretService: Library for Storing Secrets in Google Apps Script

SecretService: Library for Storing Secrets in Google Apps Script

Comments
2 min read
Mastering File Upload Security: DoS and Antivirus

Mastering File Upload Security: DoS and Antivirus

24
Comments
9 min read
Atlassian security incidents: 2023 in Review

Atlassian security incidents: 2023 in Review

Comments
8 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
Simplify Configuration Management for Efficient Cloud Operations

Simplify Configuration Management for Efficient Cloud Operations

Comments
3 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
How To Implement AWS SSB Controls in Terraform - Part 1

How To Implement AWS SSB Controls in Terraform - Part 1

4
Comments
10 min read
Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Aplicações de Segurança no Desenvolvimento de um Software: Hash e Salt #1

Comments
2 min read
Sloan's Inbox: Is security still an afterthought?

Sloan's Inbox: Is security still an afterthought?

6
Comments 7
2 min read
The importance of stateless architecture in authorization systems

The importance of stateless architecture in authorization systems

Comments
7 min read
GitLab Vulnerabilities And Security Incidents: 2023 In Review

GitLab Vulnerabilities And Security Incidents: 2023 In Review

Comments
7 min read
Key derivation in .NET using HKDF

Key derivation in .NET using HKDF

Comments
3 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

Comments
2 min read
All You Need To Know To Secure Your Data From Phishing

All You Need To Know To Secure Your Data From Phishing

6
Comments
4 min read
Linux Exfiltration

Linux Exfiltration

6
Comments 2
3 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

Comments
7 min read
Adding Clerk Authentication to a NextJS App

Adding Clerk Authentication to a NextJS App

27
Comments 1
4 min read
Security in AWS: IAM Best Practices and Advanced Techniques

Security in AWS: IAM Best Practices and Advanced Techniques

9
Comments
13 min read
Take the pain to learn user authentication before you use an external provider

Take the pain to learn user authentication before you use an external provider

8
Comments 3
6 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Understanding the Principle of "Least Privilege" in AWS

Understanding the Principle of "Least Privilege" in AWS

Comments
2 min read
Securing the Cloud #22

Securing the Cloud #22

Comments
5 min read
Discover the Difference Between Port 80 and 443

Discover the Difference Between Port 80 and 443

6
Comments 1
3 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
How to manage Access Control in Solidity Smart Contract

How to manage Access Control in Solidity Smart Contract

Comments
3 min read
Workshop - How to Write Custom Security Tests

Workshop - How to Write Custom Security Tests

Comments
1 min read
O que é HTTP?

O que é HTTP?

1
Comments
3 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
Start to Learn Secure App with Ruby on Rails

Start to Learn Secure App with Ruby on Rails

2
Comments
6 min read
AWS VPC Endpoint is JUST a FinOps topic!?

AWS VPC Endpoint is JUST a FinOps topic!?

2
Comments
3 min read
loading...