DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Frontend Web Security - Protecting Against Common Threats

Frontend Web Security - Protecting Against Common Threats

Comments
2 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Detect AES in ECB mode

Detect AES in ECB mode

Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

2
Comments
8 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Comments
7 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
O que é SOAR?

O que é SOAR?

1
Comments
4 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

2
Comments
2 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
JavaScript Security: Simple Practices to Secure Your Frontend

JavaScript Security: Simple Practices to Secure Your Frontend

19
Comments
3 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

Comments
13 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

5
Comments
9 min read
Are Your Secrets Projects Truly Safe?🔐

Are Your Secrets Projects Truly Safe?🔐

Comments 2
2 min read
Security news weekly round-up - 10 May 2024

Security news weekly round-up - 10 May 2024

2
Comments 1
2 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

3
Comments
1 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
Securing the Cloud #28

Securing the Cloud #28

Comments
4 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

8
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

3
Comments
2 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

4
Comments 1
2 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

2
Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
AppArmor testsuite

AppArmor testsuite

Comments
1 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

5
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

1
Comments
8 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

6
Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

Comments
2 min read
OWASP Amass

OWASP Amass

Comments
2 min read
Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

1
Comments 1
2 min read
Update! Interactive description of iptables tables

Update! Interactive description of iptables tables

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
11 API Trends to Watch for in 2024

11 API Trends to Watch for in 2024

Comments
7 min read
Configure Renovate to handle nuspec files

Configure Renovate to handle nuspec files

Comments
2 min read
Configure Renovate to update preview versions of NuGet packages

Configure Renovate to update preview versions of NuGet packages

Comments
2 min read
Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments
3 min read
Remotely Access Your Home Assistant Instance Securely

Remotely Access Your Home Assistant Instance Securely

Comments
6 min read
Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Comments
4 min read
Security news weekly round-up - 3rd May 2024

Security news weekly round-up - 3rd May 2024

1
Comments
3 min read
Why IMDSv1 is a Security Risk for Cloud Infrastructure

Why IMDSv1 is a Security Risk for Cloud Infrastructure

1
Comments
4 min read
AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

Comments
8 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
A tale of TimescaleDB, SQLx and testing in Rust

A tale of TimescaleDB, SQLx and testing in Rust

Comments
18 min read
Client assertion in OAuth 2.0 client authentication

Client assertion in OAuth 2.0 client authentication

8
Comments
4 min read
loading...