DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Managing SSH Keys Across Multiple Devices

Managing SSH Keys Across Multiple Devices

Comments 1
2 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
Greetings to you.

Greetings to you.

Comments 1
1 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Comments
4 min read
Secure API Gateway with Amazon Cognito using SAM

Secure API Gateway with Amazon Cognito using SAM

Comments
7 min read
Mantendo seus dados segregados por PadrĂŁo

Mantendo seus dados segregados por PadrĂŁo

2
Comments 3
6 min read
How to secure API Gateway using JWT and Lambda Authorizers with Clerk

How to secure API Gateway using JWT and Lambda Authorizers with Clerk

14
Comments
11 min read
What's New With AWS Security? | April Edition

What's New With AWS Security? | April Edition

1
Comments
4 min read
What's New With AWS Security? | March Edition

What's New With AWS Security? | March Edition

1
Comments
3 min read
Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

Security for Citizen Developers: Low-Code/No-Code Cybersecurity Threats

9
Comments
2 min read
Twitch Adblock. Block all Ads on Twitch with Stands Ad Blocker

Twitch Adblock. Block all Ads on Twitch with Stands Ad Blocker

Comments
1 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
Issue 43 of AWS Cloud Security Weekly

Issue 43 of AWS Cloud Security Weekly

4
Comments
2 min read
Do You Need an SBOM?

Do You Need an SBOM?

2
Comments
5 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
Building for Tomorrow: Part 2 of the Web Application Security Series

Building for Tomorrow: Part 2 of the Web Application Security Series

4
Comments
3 min read
Securing the Foundation: Part 1 of the Web Application Security Series

Securing the Foundation: Part 1 of the Web Application Security Series

3
Comments
5 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

1
Comments
8 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

5
Comments
3 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

6
Comments
3 min read
Securely connect to an Amazon RDS

Securely connect to an Amazon RDS

3
Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

Comments
2 min read
OWASP Amass

OWASP Amass

Comments
2 min read
Securing Docker: Non-Root User Best Practices

Securing Docker: Non-Root User Best Practices

Comments
6 min read
Update! Interactive description of iptables tables

Update! Interactive description of iptables tables

Comments
1 min read
Simplifying Keycloak Configuration with Terraform and Terragrunt

Simplifying Keycloak Configuration with Terraform and Terragrunt

1
Comments
7 min read
How to implement JWT in Laravel API

How to implement JWT in Laravel API

3
Comments
4 min read
Configure Renovate to handle nuspec files

Configure Renovate to handle nuspec files

Comments
2 min read
Configure Renovate to update preview versions of NuGet packages

Configure Renovate to update preview versions of NuGet packages

Comments
2 min read
Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments
3 min read
API Keys vs. Tokens: They're Not the Same Thing!

API Keys vs. Tokens: They're Not the Same Thing!

7
Comments
3 min read
重置 Linux root 密碼

重置 Linux root 密碼

Comments
1 min read
Encrypting with Block Ciphers: A Guide to AES, CBC, and More

Encrypting with Block Ciphers: A Guide to AES, CBC, and More

2
Comments
6 min read
Remotely Access Your Home Assistant Instance Securely

Remotely Access Your Home Assistant Instance Securely

Comments
6 min read
Security news weekly round-up - 3rd May 2024

Security news weekly round-up - 3rd May 2024

1
Comments
3 min read
Why IMDSv1 is a Security Risk for Cloud Infrastructure

Why IMDSv1 is a Security Risk for Cloud Infrastructure

1
Comments
4 min read
What are passkeys and how do they work?

What are passkeys and how do they work?

23
Comments 3
6 min read
How legacy VB6 systems are endangering healthcare providers

How legacy VB6 systems are endangering healthcare providers

10
Comments
4 min read
AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

Comments
8 min read
For developers: you must not require needs passwords from users

For developers: you must not require needs passwords from users

14
Comments 22
4 min read
Brute Force Attacks and CAPTCHA

Brute Force Attacks and CAPTCHA

4
Comments 1
2 min read
The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

The Ultimate Developer’s Guide to AES-GCM: Encrypt and Decrypt with JavaScript and the Web Cryptography API

Comments
9 min read
Why Understanding Your Open Source Licenses Matters

Why Understanding Your Open Source Licenses Matters

7
Comments
6 min read
Data Encryption

Data Encryption

1
Comments
2 min read
Securing Your Cloud: Proactive Strategies for AWS Security

Securing Your Cloud: Proactive Strategies for AWS Security

7
Comments
5 min read
Your S3 objects could be public (even though the AWS Console doesn't say so)

Your S3 objects could be public (even though the AWS Console doesn't say so)

3
Comments 1
5 min read
Password Management: The Basics

Password Management: The Basics

10
Comments 9
10 min read
A tale of TimescaleDB, SQLx and testing in Rust

A tale of TimescaleDB, SQLx and testing in Rust

Comments
18 min read
Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

Set up Pritunl Server and Integrate with Filebeat, Elasticsearch & Kibana for getting logs and alerts.

2
Comments
5 min read
Enhancing security for Lambda function URLs

Enhancing security for Lambda function URLs

2
Comments
6 min read
Scopes and Claims Explained

Scopes and Claims Explained

Comments
3 min read
Access Google Cloud Secret Manager via Google Apps Script

Access Google Cloud Secret Manager via Google Apps Script

Comments
2 min read
Public IP Over VPN in Azure

Public IP Over VPN in Azure

Comments
5 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

6
Comments
2 min read
JS Security Tip 05-01-2024 ICYMI

JS Security Tip 05-01-2024 ICYMI

Comments
1 min read
Optimise and Secure AWS HTTP API Gateway by locking down direct access

Optimise and Secure AWS HTTP API Gateway by locking down direct access

2
Comments
8 min read
Security: We have been Fooled.

Security: We have been Fooled.

3
Comments
3 min read
HTTP Tools for Security Researchers and Pen Testers

HTTP Tools for Security Researchers and Pen Testers

6
Comments 4
3 min read
loading...