DEV Community 👩‍💻👨‍💻

# applicationsecurity

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server

You should be using HTTP Strict Transport Security (HSTS) headers in your Node.js server

Comments
7 min read
Adding security to Nuxt 3

Adding security to Nuxt 3

Comments
4 min read
How to verify and secure your Mastodon account

How to verify and secure your Mastodon account

Comments
4 min read
NPM security: preventing supply chain attacks

NPM security: preventing supply chain attacks

Comments
15 min read
How to use GitHub Actions environment variables

How to use GitHub Actions environment variables

Reactions 2 Comments
7 min read
How to write tests in Python using doctest

How to write tests in Python using doctest

Reactions 2 Comments
5 min read
A Talk About Java Serialization and Deserialization

A Talk About Java Serialization and Deserialization

Reactions 1 Comments
6 min read
Implementing TLS in Java

Implementing TLS in Java

Comments
9 min read
How to Fix MSDT Vulnerability using SCCM and Intune | CVE-2022-30190

How to Fix MSDT Vulnerability using SCCM and Intune | CVE-2022-30190

Reactions 3 Comments
7 min read
Breaking down the ‘critical’ OpenSSL vulnerability

Breaking down the ‘critical’ OpenSSL vulnerability

Comments
7 min read
Secure Python URL validation

Secure Python URL validation

Comments
7 min read
Ruby on Rails Docker for local development environment

Ruby on Rails Docker for local development environment

Comments
8 min read
How to create SBOMs in Java with Maven and Gradle

How to create SBOMs in Java with Maven and Gradle

Comments
8 min read
Container images simplified with Ko

Container images simplified with Ko

Comments
14 min read
Secure JavaScript URL validation

Secure JavaScript URL validation

Comments
8 min read
Implementing TLS/SSL in Python

Implementing TLS/SSL in Python

Comments
6 min read
Improving code quality with linting in Python

Improving code quality with linting in Python

Comments
7 min read
How to install Ruby in a macOS for local development

How to install Ruby in a macOS for local development

Comments
7 min read
Avoiding SMTP Injection: A Whitebox primer

Avoiding SMTP Injection: A Whitebox primer

Comments
7 min read
Using Kubernetes ConfigMaps securely

Using Kubernetes ConfigMaps securely

Comments
7 min read
How to find and fix XML entity vulnerabilities

How to find and fix XML entity vulnerabilities

Comments
9 min read
Solve Hack the Box and other CTF challenges with Snyk

Solve Hack the Box and other CTF challenges with Snyk

Reactions 1 Comments
8 min read
Best practices for containerizing .net applications

Best practices for containerizing .net applications

Comments
9 min read
Applying the principle of least privilege to Kubernetes using RBAC

Applying the principle of least privilege to Kubernetes using RBAC

Comments 1
7 min read
Best practices for managing Java dependencies

Best practices for managing Java dependencies

Reactions 1 Comments
8 min read
A definitive guide to Ruby gems dependency management

A definitive guide to Ruby gems dependency management

Reactions 2 Comments
11 min read
Detecting log4j using ShiftLeft CORE

Detecting log4j using ShiftLeft CORE

Reactions 6 Comments
2 min read
Best Practices for Application Security in the Cloud

Best Practices for Application Security in the Cloud

Reactions 2 Comments
8 min read
Mobile Security: OWASP List

Mobile Security: OWASP List

Reactions 3 Comments
3 min read
How to Start Tracking Your Application Dependencies

How to Start Tracking Your Application Dependencies

Reactions 2 Comments
2 min read
Validating JWTs in Web APIs

Validating JWTs in Web APIs

Reactions 11 Comments
2 min read
Application Security Best Practices / Defensive Programming

Application Security Best Practices / Defensive Programming

Reactions 20 Comments
12 min read
How to secure a multitenant application architecture

How to secure a multitenant application architecture

Reactions 16 Comments
4 min read
All about SIEM

All about SIEM

Reactions 3 Comments
2 min read
Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Ryan Lockard Names the Seven Deadly Sins of DevSecOps

Reactions 2 Comments
1 min read
Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Pushing Left, Like a Boss - Part 7: Code Review and Static Code Analysis

Reactions 49 Comments 2
1 min read
Pushing Left, Like a Boss - Part 6: Threat Modelling

Pushing Left, Like a Boss - Part 6: Threat Modelling

Reactions 18 Comments
1 min read
Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Pushing Left, Like a Boss, Part 5.14 Secure Coding Summary

Reactions 17 Comments
1 min read
Developers need to stop fearing the InfoSec Mafia

Developers need to stop fearing the InfoSec Mafia

Reactions 10 Comments
1 min read
Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Pushing Left, Like a Boss — Part 5.1 — Input Validation, Output Encoding and Parameterized Queries

Reactions 11 Comments 1
1 min read
Pushing Left, Like a Boss: Part 1

Pushing Left, Like a Boss: Part 1

Reactions 75 Comments 5
1 min read
Implementing Authentication with Azure AD

Implementing Authentication with Azure AD

Reactions 11 Comments
1 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis

Reactions 2 Comments
1 min read
Anyone Can Have a Bad Day

Anyone Can Have a Bad Day

Reactions 14 Comments
6 min read
Simple Tool for Testing CVE Mitigation in Web Apps

Simple Tool for Testing CVE Mitigation in Web Apps

Reactions 8 Comments 1
4 min read
Implement Secure data solutions

Implement Secure data solutions

Reactions 5 Comments
2 min read
Updating a .netcore Website’s Security Headers

Updating a .netcore Website’s Security Headers

Reactions 4 Comments
1 min read
loading...