DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
AI in Cybersecurity: Improving Data Security Services

AI in Cybersecurity: Improving Data Security Services

Comments
4 min read
Resourcely founder-led in person or virtual hands-on workshop

Resourcely founder-led in person or virtual hands-on workshop

Comments
1 min read
How to Deploy Infisical to Manage Application Secrets on Koyeb

How to Deploy Infisical to Manage Application Secrets on Koyeb

Comments
11 min read
Need Help with Nodemailer Access Issues on Outlook and Gmail

Need Help with Nodemailer Access Issues on Outlook and Gmail

Comments
1 min read
Using ModSecurity in Nginx project — maintaining protection on WordPress

Using ModSecurity in Nginx project — maintaining protection on WordPress

5
Comments
8 min read
Serverless on GCP using Cloud Functions

Serverless on GCP using Cloud Functions

1
Comments
1 min read
VerifyVault Beta v0.2.2 Released - Alternative to Authy

VerifyVault Beta v0.2.2 Released - Alternative to Authy

Comments
1 min read
Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Api-platform : filtrer les résultats uniquement sur l'utilisateur connecté

Comments
2 min read
What’s the difference between RBAC and ABAC in Fauna?

What’s the difference between RBAC and ABAC in Fauna?

Comments
2 min read
Practical Steps to Enhance Your Security Today

Practical Steps to Enhance Your Security Today

1
Comments
2 min read
Using the Trusty API to discover deprecated and malicious packages.

Using the Trusty API to discover deprecated and malicious packages.

3
Comments
2 min read
Top 5 Security Practices for Web Developers

Top 5 Security Practices for Web Developers

Comments
2 min read
Amazon GuardDuty Malware Protection for Amazon S3

Amazon GuardDuty Malware Protection for Amazon S3

1
Comments
2 min read
AWS: Karpenter and SSH for Kubernetes WorkerNodes

AWS: Karpenter and SSH for Kubernetes WorkerNodes

2
Comments
10 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

Comments
1 min read
Enhancing Your Cloud Security Services for Optimal Protection

Enhancing Your Cloud Security Services for Optimal Protection

1
Comments
3 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

Comments
2 min read
Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

1
Comments
2 min read
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Enabling Workload Identity Federation for Github Actions on GCP

Enabling Workload Identity Federation for Github Actions on GCP

Comments
1 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

6
Comments
9 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

5
Comments 1
3 min read
Securing Firebase Connections in Next.js with HTTPS

Securing Firebase Connections in Next.js with HTTPS

Comments
2 min read
Webhook Security Approaches

Webhook Security Approaches

7
Comments
3 min read
Drupal Access Policy demystified

Drupal Access Policy demystified

1
Comments 3
12 min read
Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Demystifying AWS Security: IAM Password Policies vs. Automated Access Key Rotation

Comments
2 min read
The Body Shop of Security: Biometrics

The Body Shop of Security: Biometrics

22
Comments
2 min read
The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

1
Comments
6 min read
Identifying Container Image Vulnerabilities with Docker Scout

Identifying Container Image Vulnerabilities with Docker Scout

Comments
1 min read
Mitigating XSS Risks: Best Practices for Web Applications

Mitigating XSS Risks: Best Practices for Web Applications

7
Comments
4 min read
How AI and Machine Learning Are Revolutionizing IT Services

How AI and Machine Learning Are Revolutionizing IT Services

Comments
2 min read
Use non-root user in scratch docker image

Use non-root user in scratch docker image

Comments
1 min read
ScoutSuite

ScoutSuite

Comments
2 min read
DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

DEPLOYMENT OF NODEJS APP IN KUBERNETES WITH DEVSECOPS CICD PIPELINE

1
Comments
1 min read
Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Combining Edge Stack & Istio to Unlock the Full Potential of Your K8s Microservices

Comments
8 min read
Identity and Access Management: Why it is an Absolute Necessity Today

Identity and Access Management: Why it is an Absolute Necessity Today

Comments
4 min read
Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Upstream preview: Government carrot, government stick: Exploring two contrasting approaches to improving open source security

Comments
2 min read
Upstream preview: The value of open source software

Upstream preview: The value of open source software

Comments
3 min read
Recreating Stripe’s Roles in PropelAuth

Recreating Stripe’s Roles in PropelAuth

Comments
5 min read
Internet security through lava lamps

Internet security through lava lamps

Comments
3 min read
Java URI Library Compliant with RFC 3986

Java URI Library Compliant with RFC 3986

Comments
9 min read
BSides312 2024: Insights and Innovations in Cybersecurity

BSides312 2024: Insights and Innovations in Cybersecurity

Comments
6 min read
Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

Identifying a typosquatting attack on "requests," the 4th-most-popular Python package

4
Comments 1
1 min read
5 Auth0 Gotchas to Consider

5 Auth0 Gotchas to Consider

Comments
3 min read
Managing and Rotating Secrets with AWS Secrets Manager

Managing and Rotating Secrets with AWS Secrets Manager

4
Comments
4 min read
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

Comments
10 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

2
Comments
2 min read
Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

3
Comments
2 min read
Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

4
Comments
8 min read
Lập trình web phải phân biệt được Session và Cookie

Lập trình web phải phân biệt được Session và Cookie

Comments 1
4 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

1
Comments
2 min read
Amazon Macie to detect sensitive data from your S3 Buckets

Amazon Macie to detect sensitive data from your S3 Buckets

13
Comments
4 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

9
Comments 2
4 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

1
Comments
5 min read
Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
loading...