DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Passwords: Are they going extinct?

Passwords: Are they going extinct?

5
Comments
6 min read
How to Secure PHP Applications from SQL Injection Attacks

How to Secure PHP Applications from SQL Injection Attacks

Comments
3 min read
The Day a DDOS Attack Led to the Most Awkward Hello World

The Day a DDOS Attack Led to the Most Awkward Hello World

15
Comments
2 min read
CUPP: How Dictionary based Bruteforce Attacks can be more optimized

CUPP: How Dictionary based Bruteforce Attacks can be more optimized

Comments
5 min read
More Secure JWT | A Better Experience

More Secure JWT | A Better Experience

6
Comments
6 min read
Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

Why OpenAI and Gemini AI Do Not Fit into Your Company’s Security Plan

1
Comments
9 min read
6 Ways to Protect Your Personal Information Online (Master Guide)

6 Ways to Protect Your Personal Information Online (Master Guide)

5
Comments
5 min read
Cybersecurity Erosion: Addressing the Hidden Threat to Long-Term Security

Cybersecurity Erosion: Addressing the Hidden Threat to Long-Term Security

Comments
4 min read
Cybersecurity Awareness Month: Stay Safe Online

Cybersecurity Awareness Month: Stay Safe Online

Comments
3 min read
Project Overview: AWS Inspector in Jenkins Pipeline

Project Overview: AWS Inspector in Jenkins Pipeline

15
Comments
3 min read
The Dynamic Application Security Testing Process: A Step-by-Step Guide

The Dynamic Application Security Testing Process: A Step-by-Step Guide

Comments
4 min read
The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

The Vital Role of Human Review in an AI-Powered Future. 👩‍💻 🤖

Comments
1 min read
Securing Your Website with Basic Auth for NGINX

Securing Your Website with Basic Auth for NGINX

Comments
4 min read
How I Secured My Containerized Application Using Anchore (Day 29 Project)

How I Secured My Containerized Application Using Anchore (Day 29 Project)

Comments
3 min read
What Is WebAuthN: A Developer's Guide To WebAuthN

What Is WebAuthN: A Developer's Guide To WebAuthN

Comments
6 min read
DevOps Prerequisite (Part 9): SSL and TLS

DevOps Prerequisite (Part 9): SSL and TLS

Comments
4 min read
Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Enhancing T-Mobile's Security: Embracing Modern Zero-Trust Architecture

Comments
7 min read
Keys in SQL | Primary Key | Foreign Key| Candidate Key|Composite Key |Alternate Key|Super Key|Surrogate Key| Unique Key

Keys in SQL | Primary Key | Foreign Key| Candidate Key|Composite Key |Alternate Key|Super Key|Surrogate Key| Unique Key

Comments
3 min read
Whats Information Security?

Whats Information Security?

Comments
1 min read
Good Security Boosts Your Flow

Good Security Boosts Your Flow

Comments
7 min read
TLS vs SSL

TLS vs SSL

Comments
2 min read
Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Firewalls in Zero-Trust Security: Fortifying Modern Cyber Defenses

Comments
15 min read
How to Use Nmap & Zenmap for Network Security Scanning

How to Use Nmap & Zenmap for Network Security Scanning

1
Comments
4 min read
Stereotype of a Nigeria Hacker

Stereotype of a Nigeria Hacker

5
Comments
2 min read
Security news weekly round-up - 4th October 2024

Security news weekly round-up - 4th October 2024

1
Comments
3 min read
How to Use Secrets in GitHub Actions Workflows

How to Use Secrets in GitHub Actions Workflows

13
Comments 1
4 min read
Database 101: SSL/TLS for beginners

Database 101: SSL/TLS for beginners

161
Comments 5
17 min read
Streamline Keyper CI/CD Pipeline with Keyper's Github Action

Streamline Keyper CI/CD Pipeline with Keyper's Github Action

1
Comments
4 min read
Key Security principles for Frontend and backend Development

Key Security principles for Frontend and backend Development

Comments
7 min read
Security news weekly round-up - 27th September 2024

Security news weekly round-up - 27th September 2024

Comments
4 min read
This Month in Minder: September 2024

This Month in Minder: September 2024

Comments
1 min read
A Quick Understanding of Session Hijacking

A Quick Understanding of Session Hijacking

Comments
3 min read
Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Comments
5 min read
Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

Welcome to My Cybersecurity Journey: A Beginner’s Guide to Cybersecurity

1
Comments
2 min read
Security Configuration in HTTP headers

Security Configuration in HTTP headers

Comments
2 min read
Wednesday Links - Edition 2024-09-25

Wednesday Links - Edition 2024-09-25

Comments
1 min read
Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Comments
3 min read
Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Recently Released: Coverage-Guided REST API Fuzzer — WuppieFuzz! 🛠️

Comments
2 min read
Security and Data Protection in Crypto Exchange Mining Pools

Security and Data Protection in Crypto Exchange Mining Pools

Comments
2 min read
Proxmox and NAS: Implementing VLANs for Network Isolation

Proxmox and NAS: Implementing VLANs for Network Isolation

Comments
4 min read
Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Encrypting Your Etcd Credentials: A Critical Step for Kubernetes Security

Comments
3 min read
Is Your Phone Hacked? Signs and Steps to Take

Is Your Phone Hacked? Signs and Steps to Take

Comments
3 min read
Back to Basics: The CrowdStrike Incident and Fundamental IT Security Principles

Back to Basics: The CrowdStrike Incident and Fundamental IT Security Principles

Comments
1 min read
Introduction to SSH setup

Introduction to SSH setup

Comments
4 min read
Strengthening Data Security in the Age of Remote Work

Strengthening Data Security in the Age of Remote Work

1
Comments 1
3 min read
How to Pass Information Between Jobs in GitHub Actions

How to Pass Information Between Jobs in GitHub Actions

12
Comments
4 min read
Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Lessons Learned #2: Your new feature could introduce a security vulnerability to your old feature (Clickhouse CVE-2024-22412)

Comments
4 min read
Introduction to System Design: A Beginner-Friendly Guide

Introduction to System Design: A Beginner-Friendly Guide

5
Comments
6 min read
Securing Rails application with Action Policy

Securing Rails application with Action Policy

Comments
4 min read
Geolocation fun with Gemini

Geolocation fun with Gemini

Comments
7 min read
Mastering Authentication in Node.js and Express: A Comprehensive Guide

Mastering Authentication in Node.js and Express: A Comprehensive Guide

Comments
4 min read
Security news weekly round-up - 20th September 2024

Security news weekly round-up - 20th September 2024

1
Comments
3 min read
How to avoid bricking your device during update rollouts

How to avoid bricking your device during update rollouts

Comments
2 min read
Can you run an AWS command from Slack, without any AWS credentials? Let’s find out!

Can you run an AWS command from Slack, without any AWS credentials? Let’s find out!

2
Comments
4 min read
Ensure a robust and secure environment

Ensure a robust and secure environment

Comments
2 min read
How to mitigate attacks on WordPress when running under a full CDN like Cloudflare

How to mitigate attacks on WordPress when running under a full CDN like Cloudflare

Comments
7 min read
Web Development Legal Rules!

Web Development Legal Rules!

Comments
1 min read
Malware: Detection, Collection, and Analysis

Malware: Detection, Collection, and Analysis

1
Comments 2
3 min read
🚀 Enhancing OAuth Security & User Experience 🔒

🚀 Enhancing OAuth Security & User Experience 🔒

Comments
1 min read
What are ITDR in cyber security?

What are ITDR in cyber security?

Comments
1 min read
loading...