DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Transfer contents and files using SCP from remote to local machine via bastion

Transfer contents and files using SCP from remote to local machine via bastion

3
Comments
2 min read
How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

How to Improve Your Security Posture in Just a Few Clicks with AWS IAM Access Analyzer

Comments
5 min read
Enhance your python code security using bandit

Enhance your python code security using bandit

Comments
2 min read
Secure your API with these 16 Practices with Apache APISIX - part 2

Secure your API with these 16 Practices with Apache APISIX - part 2

23
Comments
3 min read
Tracking your security posture in AWS

Tracking your security posture in AWS

2
Comments
4 min read
Auditing AWS EKS Pod Permissions

Auditing AWS EKS Pod Permissions

4
Comments
8 min read
Transform Your Favorite Place or Object into a Master Password with PicKey

Transform Your Favorite Place or Object into a Master Password with PicKey

Comments
5 min read
How to manage Access Control in Solidity Smart Contract

How to manage Access Control in Solidity Smart Contract

Comments
3 min read
How to hide files or data in a JPEG Image

How to hide files or data in a JPEG Image

18
Comments 8
4 min read
Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Embracing Transparency: Dr. Allan Friedman's Vision for Open Source Security

Comments
2 min read
Build Your First Password Cracker

Build Your First Password Cracker

15
Comments
5 min read
Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

Shielding Your Data: Safeguarding AWS S3 via VPC Endpoints.

2
Comments
6 min read
Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Maintain a Healthy Sense of Caution Whenever Running a `curl|bash` Command

Comments
5 min read
Double Down on Security: IAM MFA in AWS

Double Down on Security: IAM MFA in AWS

Comments
2 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)

Comments
8 min read
Workflow Integration with AI: A Unified Approach to Development

Workflow Integration with AI: A Unified Approach to Development

10
Comments
10 min read
Quick guide to applying MuleSoft's API Autodiscovery

Quick guide to applying MuleSoft's API Autodiscovery

Comments
2 min read
SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

SSO vs. Identity Federation: Optimizing Authentication for Modern Enterprises

30
Comments 3
3 min read
Apple Announces PQ3

Apple Announces PQ3

1
Comments
1 min read
Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

Man In The Middle Attack (MITM) Part 2 — Packet Sniffer

2
Comments
8 min read
Announcing our Capture the Flag Challenge: broken-navigator

Announcing our Capture the Flag Challenge: broken-navigator

5
Comments
2 min read
Quick guide to secure/encrypt your properties in MuleSoft

Quick guide to secure/encrypt your properties in MuleSoft

1
Comments
1 min read
You need a Proxy Server to proctect you 🛡️🐞

You need a Proxy Server to proctect you 🛡️🐞

2
Comments
3 min read
Cybersecurity basics: security mindset

Cybersecurity basics: security mindset

6
Comments
7 min read
Is Using Firebase on Client-Side Safe? 🔒

Is Using Firebase on Client-Side Safe? 🔒

7
Comments
3 min read
Proxy VS Reverse Proxy

Proxy VS Reverse Proxy

11
Comments 4
4 min read
Understanding SDLC and How Security Plays Into it

Understanding SDLC and How Security Plays Into it

1
Comments
5 min read
Understanding Linux Basic Permissions: A Comprehensive Guide

Understanding Linux Basic Permissions: A Comprehensive Guide

1
Comments
2 min read
Security in FastAPI: Best practices to protect your application (Part I)

Security in FastAPI: Best practices to protect your application (Part I)

Comments
4 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
The Role of CNAPP in Modern DevSecOps

The Role of CNAPP in Modern DevSecOps

Comments
5 min read
Securing Grafana for Web Access

Securing Grafana for Web Access

1
Comments
5 min read
Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

1
Comments
8 min read
Building Digital Trust: A Look at Top Identity Verification Solutions

Building Digital Trust: A Look at Top Identity Verification Solutions

Comments
2 min read
My Developer Nightmare

My Developer Nightmare

9
Comments
3 min read
Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

Learn by building: What is TOTP? Building a Simple TOTP Authentication Server with Node.js

3
Comments
4 min read
Securing API Keys in SwiftUI: A Practical Guide (Intro)

Securing API Keys in SwiftUI: A Practical Guide (Intro)

Comments
5 min read
Overcoming Challenges in Containerized Microservices Architecture: A Case Study

Overcoming Challenges in Containerized Microservices Architecture: A Case Study

1
Comments
2 min read
Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Comments
5 min read
Whitehouse Declares Software Should Be Memory Safe

Whitehouse Declares Software Should Be Memory Safe

27
Comments 17
1 min read
Level up your vulnerability management skills . . . painlessly

Level up your vulnerability management skills . . . painlessly

1
Comments
1 min read
Good Application Security Posture Management Requires Great Data

Good Application Security Posture Management Requires Great Data

Comments
6 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
Top Secrets Management Tools for 2024

Top Secrets Management Tools for 2024

4
Comments 1
10 min read
Understanding Ethernet and Fiber Op

Understanding Ethernet and Fiber Op

1
Comments
3 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
Protegendo APIs da Esquerda para a Direita (e em td no meio do caminho) [Tradução +/- Comentada]

Protegendo APIs da Esquerda para a Direita (e em td no meio do caminho) [Tradução +/- Comentada]

6
Comments
18 min read
Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

Attribute Based Access Control (ABAC) Implementation with Open Policy Agent (OPA)

18
Comments
8 min read
Writing a Network Scanner using Python

Writing a Network Scanner using Python

8
Comments 3
12 min read
Integrating Azure Secrets into your .NET Web Application

Integrating Azure Secrets into your .NET Web Application

Comments
3 min read
Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Pull Request Reporting with CDK-Validator-CFNGuard and Azure DevOps

Comments 1
6 min read
AWS VPC Endpoint is NOT a security topic!?

AWS VPC Endpoint is NOT a security topic!?

6
Comments
3 min read
OAuth2 explained: Bob's tale

OAuth2 explained: Bob's tale

1
Comments
2 min read
JWT can fit as an authentication system with a blacklist technique

JWT can fit as an authentication system with a blacklist technique

3
Comments 11
3 min read
Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

Implementing fine-grained access control with ASP.NET Core custom endpoint metadata

2
Comments
4 min read
GitHub Security Best Practices Every Developer Should Know

GitHub Security Best Practices Every Developer Should Know

36
Comments 6
4 min read
Patching your Auto Scaling Group on AWS

Patching your Auto Scaling Group on AWS

2
Comments
3 min read
PassKey in Go

PassKey in Go

4
Comments 1
9 min read
How to Secure Your AWS Account Using a Hardware security key [YubiKey]

How to Secure Your AWS Account Using a Hardware security key [YubiKey]

7
Comments
3 min read
#DevOps para noobs - Proxy Reverso

#DevOps para noobs - Proxy Reverso

188
Comments 12
3 min read
loading...