DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Guide to Common Web Application Security Vulnerabilities and Mitigation

A Guide to Common Web Application Security Vulnerabilities and Mitigation

6
Comments
16 min read
HackTheBox - Writeup Codify [Retired]

HackTheBox - Writeup Codify [Retired]

5
Comments
9 min read
How to secure an existing SSH key with a passphrase

How to secure an existing SSH key with a passphrase

5
Comments
2 min read
How to generate a secure and robust SSH key in 2024

How to generate a secure and robust SSH key in 2024

5
Comments
2 min read
Why using a passphrase to secure your SSH key ?

Why using a passphrase to secure your SSH key ?

7
Comments
2 min read
Infrastructure protection on AWS for Beginners

Infrastructure protection on AWS for Beginners

Comments
7 min read
Security news weekly round-up - 5th April 2024

Security news weekly round-up - 5th April 2024

1
Comments
3 min read
How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

How to Implement Biometric Authentication with Jetpack Compose and AES Encryption

1
Comments
7 min read
�? Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! �?

�? Lucia Auth: A Flexible Open Source Authentication Library for the JavaScript Ecosystem! �?

Comments
2 min read
GitHub: signing commit in a workflow

GitHub: signing commit in a workflow

2
Comments
2 min read
Using nmap for Continuous Vulnerability Monitoring

Using nmap for Continuous Vulnerability Monitoring

2
Comments
6 min read
The Adventures of Blink #17: Continuous Security... DevSecOps!

The Adventures of Blink #17: Continuous Security... DevSecOps!

Comments
5 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
API Security Best Practices: Enable Good Governance

API Security Best Practices: Enable Good Governance

Comments
6 min read
WordPress Security

WordPress Security

5
Comments
5 min read
Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

Security Awareness, Secure Coding, and Zero-Trust - Bridging Frontend and Cybersecurity

2
Comments
2 min read
How to know if you have the XZ vulnerability and what you can do about it

How to know if you have the XZ vulnerability and what you can do about it

Comments
2 min read
Social media authentication: convenience vs privacy

Social media authentication: convenience vs privacy

1
Comments
5 min read
Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

Application Security - Bridging Frontend and Cybersecurity: How do we identify what to protect by teams or companies?

4
Comments
3 min read
Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

Application Security - Bridging Frontend and Cybersecurity: What is Application Security?

5
Comments
3 min read
The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

The IoT, Smart Warehouses, and Security Vulnerabilities: What to Know

Comments
5 min read
Security fundamentals: buffer overflow

Security fundamentals: buffer overflow

Comments
14 min read
TryHackMe: Chrome (post #2)

TryHackMe: Chrome (post #2)

Comments
2 min read
TryHackMe: Chrome (post #1)

TryHackMe: Chrome (post #1)

Comments
3 min read
10 Common Mistakes in Developing Video Conferencing Apps for Developers

10 Common Mistakes in Developing Video Conferencing Apps for Developers

Comments
9 min read
GitHub: Personal Access Tokens

GitHub: Personal Access Tokens

Comments
5 min read
HackTheBox - Writeup Analytics

HackTheBox - Writeup Analytics

Comments
9 min read
Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

Misconfigurations in Google Firebase lead to over 19.8 million leaked secrets

5
Comments
4 min read
Security news weekly round-up - 29th March 2024

Security news weekly round-up - 29th March 2024

Comments
4 min read
Rethinking password security: say goodbye to plaintext passwords

Rethinking password security: say goodbye to plaintext passwords

1
Comments
5 min read
10 Creative Ways to Use Social Media for Recruitment

10 Creative Ways to Use Social Media for Recruitment

1
Comments
3 min read
Issue 38 of AWS Cloud Security Weekly

Issue 38 of AWS Cloud Security Weekly

2
Comments
2 min read
An Introductory Guide to AWS Identity and Access Management

An Introductory Guide to AWS Identity and Access Management

Comments
3 min read
Warn And Log Out User Due To Inactivity In Angular App

Warn And Log Out User Due To Inactivity In Angular App

Comments
3 min read
How to restrict default access to KMS via key policy

How to restrict default access to KMS via key policy

2
Comments
3 min read
Bridging Code and Security: Unveiling the Power of DevSecOps

Bridging Code and Security: Unveiling the Power of DevSecOps

6
Comments
13 min read
Securing Keycloak: Configuring Admin Access within Your Private Network

Securing Keycloak: Configuring Admin Access within Your Private Network

Comments
1 min read
API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

5
Comments
3 min read
Convert to workload identity federation

Convert to workload identity federation

Comments
2 min read
Interactive description of iptables tables

Interactive description of iptables tables

Comments
1 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻�?

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻�?

Comments
4 min read
🤖 Building RAG chatbot with NeMo Guardrails !💡

🤖 Building RAG chatbot with NeMo Guardrails !💡

Comments
2 min read
🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

Comments
3 min read
Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

Consistent Data Encryption in Android, iOS, and Flutter Apps with AES

1
Comments
6 min read
How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

Comments
4 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
Creating Passkey Authentication in a Rails 7 Application

Creating Passkey Authentication in a Rails 7 Application

1
Comments
4 min read
DynamoDB now supports resource-based policies. But is that a good idea?

DynamoDB now supports resource-based policies. But is that a good idea?

Comments
5 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
What Kills Your Flash Drive and How You Can Avoid It?

What Kills Your Flash Drive and How You Can Avoid It?

1
Comments
3 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

1
Comments
5 min read
Security news weekly round-up - 22nd March 2024

Security news weekly round-up - 22nd March 2024

1
Comments
3 min read
Make your Azure OpenAI apps compliant with RBAC

Make your Azure OpenAI apps compliant with RBAC

16
Comments
6 min read
7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

7 Frameworks, One SAML Jackson - Your Open Source Single Sign-On Solution

16
Comments
4 min read
Mastering JWT Security

Mastering JWT Security

45
Comments 7
3 min read
Elevate Your DevOps and Cloud Engineering Journey

Elevate Your DevOps and Cloud Engineering Journey

Comments
4 min read
Securing the Cloud #23

Securing the Cloud #23

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
loading...