DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Low-Code, Big Risks: Why Security Awareness is Crucial for Citizen Developers

Low-Code, Big Risks: Why Security Awareness is Crucial for Citizen Developers

5
Comments
2 min read
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code

Comments
2 min read
Reimagining cybersecurity for developers

Reimagining cybersecurity for developers

Comments
6 min read
What is Cloud Workload Security

What is Cloud Workload Security

Comments
2 min read
Setting up your own secure VPN with Amnezia VPN

Setting up your own secure VPN with Amnezia VPN

Comments
3 min read
Introduction to Chaos Engineering and LitmusChaos

Introduction to Chaos Engineering and LitmusChaos

6
Comments
5 min read
Why Security Testing is Crucial for Businesses in the USA

Why Security Testing is Crucial for Businesses in the USA

Comments
5 min read
DevSecOps?

DevSecOps?

5
Comments
3 min read
FUTURE OF TECHNOLOGY

FUTURE OF TECHNOLOGY

1
Comments
2 min read
From Vulnerabilities to Vault: How We Stopped Hardcoding Secrets and Started Using Hashicorp Vault

From Vulnerabilities to Vault: How We Stopped Hardcoding Secrets and Started Using Hashicorp Vault

11
Comments
3 min read
Dataverse Security Roles

Dataverse Security Roles

13
Comments
6 min read
Terraforming Resource Control Policies

Terraforming Resource Control Policies

3
Comments
2 min read
AI-Driven Election Security: Safeguarding Democracy in the Digital Age

AI-Driven Election Security: Safeguarding Democracy in the Digital Age

Comments
5 min read
Crypto/Web3 Scammers in LinkedIn 😈

Crypto/Web3 Scammers in LinkedIn 😈

Comments
2 min read
Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Cuarta parte

Cómo aplicar un Well Architected Review para asegurar tu infraestructura. Cuarta parte

Comments
5 min read
These Two Tools Helped Me Earn $40K in Bounties

These Two Tools Helped Me Earn $40K in Bounties

Comments
2 min read
AWS AllowList "Update"

AWS AllowList "Update"

1
Comments
2 min read
SSRF Attacks: The Silent Threat Hiding in Your Server

SSRF Attacks: The Silent Threat Hiding in Your Server

Comments
1 min read
Mario Rojas Espino: Liderazgo Ambiental y Desarrollo Sostenible en Guatemala

Mario Rojas Espino: Liderazgo Ambiental y Desarrollo Sostenible en Guatemala

Comments
2 min read
The Essential Features of Modern Physical Security Systems

The Essential Features of Modern Physical Security Systems

Comments
6 min read
Allowing any app on macOS

Allowing any app on macOS

Comments
1 min read
Upgrading Simple Shells to Fully Interactive TTYs

Upgrading Simple Shells to Fully Interactive TTYs

1
Comments
2 min read
Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Protect Your Wi-Fi: 3 Steps to Maximum Security! 🛡️

Comments
2 min read
Security news weekly round-up - 15th November 2024

Security news weekly round-up - 15th November 2024

1
Comments
3 min read
I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

Comments
1 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Comments
6 min read
Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
Common Website Security Risks and How to Avoid Them

Common Website Security Risks and How to Avoid Them

Comments
5 min read
Implement Unrecognized Device Login Alerts in React

Implement Unrecognized Device Login Alerts in React

Comments
3 min read
LINUX CHALLENGE DAY 5

LINUX CHALLENGE DAY 5

Comments 3
1 min read
Securing CI/CD Pipelines: GitHub Actions vs Jenkins

Securing CI/CD Pipelines: GitHub Actions vs Jenkins

5
Comments
5 min read
Turning Ideas into Art: Texas Animation Studios You Should Know

Turning Ideas into Art: Texas Animation Studios You Should Know

Comments
5 min read
Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Comments
2 min read
SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

Comments
7 min read
How to Use Kubernetes CronJob

How to Use Kubernetes CronJob

5
Comments
6 min read
[2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Debian 12 … is amazing! How to: Create your custom codehouse [Part 3B/4]

Debian 12 … is amazing! How to: Create your custom codehouse [Part 3B/4]

1
Comments
15 min read
Understanding the different types of SSH Keys

Understanding the different types of SSH Keys

7
Comments
3 min read
Kubernetes Custom Resources

Kubernetes Custom Resources

6
Comments
7 min read
Authentication vs. Authorization: Key Differences and Security Risks Explained

Authentication vs. Authorization: Key Differences and Security Risks Explained

Comments
2 min read
Threat Modeling for Non-Security Experts

Threat Modeling for Non-Security Experts

Comments
5 min read
Understanding JWT Security Principle

Understanding JWT Security Principle

Comments
2 min read
Schema Validation in Amazon DynamoDB

Schema Validation in Amazon DynamoDB

Comments
2 min read
Security news weekly round-up - 8th November 2024

Security news weekly round-up - 8th November 2024

Comments
4 min read
Working with Git Remotes

Working with Git Remotes

7
Comments
6 min read
Security by Design: Building Trust in Blockchain, One Block at a Time

Security by Design: Building Trust in Blockchain, One Block at a Time

Comments
2 min read
Hardware Security Modules: Preparing for the Post-Quantum Era

Hardware Security Modules: Preparing for the Post-Quantum Era

Comments
5 min read
Laravel Application Security

Laravel Application Security

Comments
2 min read
Understanding QR Codes and Choosing the Best QR Code Generators

Understanding QR Codes and Choosing the Best QR Code Generators

1
Comments 1
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Comments
4 min read
Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Understanding Stored XSS Attacks and How to Mitigate Them with Hono

Comments
3 min read
How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
7 firewall management best practices in 2024

7 firewall management best practices in 2024

Comments
4 min read
Understanding Kubernetes Jobs

Understanding Kubernetes Jobs

4
Comments
5 min read
Securing external-dns: Encrypting TXT Registry Records

Securing external-dns: Encrypting TXT Registry Records

Comments
5 min read
Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Implement a Secure, Dynamic Domain Approval System for Embeddable Widgets in Ruby on Rails

Comments
3 min read
Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
loading...