DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building a Home Lab for Cybersecurity Practice: A Step-by-Step Guide

Building a Home Lab for Cybersecurity Practice: A Step-by-Step Guide

Comments
3 min read
Vidéo: faire un projet python qui restera fonctionnel dans 2 mois

Vidéo: faire un projet python qui restera fonctionnel dans 2 mois

Comments
1 min read
Anyone Can Become Certified in Cybersecurity

Anyone Can Become Certified in Cybersecurity

Comments
3 min read
Master Linux File Ownership While Your Coffee Brews

Master Linux File Ownership While Your Coffee Brews

1
Comments
2 min read
The NIS Directive and Its Purpose

The NIS Directive and Its Purpose

1
Comments
3 min read
OWASP Top 10: What Every Developer Should Know About It

OWASP Top 10: What Every Developer Should Know About It

Comments
9 min read
Why protect undersea cables?

Why protect undersea cables?

1
Comments
1 min read
Enhancing Security with App Signature Verification

Enhancing Security with App Signature Verification

15
Comments
3 min read
How Cerbos minimizes latency in Authorization workflows

How Cerbos minimizes latency in Authorization workflows

Comments
4 min read
Side Notepad Chrome Extension

Side Notepad Chrome Extension

Comments
2 min read
Firebase authentication - Best practices for password requirements

Firebase authentication - Best practices for password requirements

Comments
1 min read
AWS-IAM Beginner perfect guide

AWS-IAM Beginner perfect guide

Comments
13 min read
Hashing, Salting, Cryptography. Help!

Hashing, Salting, Cryptography. Help!

Comments
2 min read
Security news weekly round-up - 17th January 2025

Security news weekly round-up - 17th January 2025

1
Comments
3 min read
What does securing your AWS Environment look like in 2025?

What does securing your AWS Environment look like in 2025?

2
Comments
5 min read
How can I secure the .npmrc token in a public framework?

How can I secure the .npmrc token in a public framework?

Comments
1 min read
Tại sao việc xoay vòng secrets tự động lại cực kỳ quan trọng?

Tại sao việc xoay vòng secrets tự động lại cực kỳ quan trọng?

Comments
4 min read
Top Benefits of Zero Trust Security Architecture: Enhancing Your Cybersecurity Strategy

Top Benefits of Zero Trust Security Architecture: Enhancing Your Cybersecurity Strategy

Comments
7 min read
Why Is Automated Secrets Rotation So Crucial?

Why Is Automated Secrets Rotation So Crucial?

Comments
2 min read
Building Secure and Scalable Fintech Applications: A Technical Architecture Deep Dive

Building Secure and Scalable Fintech Applications: A Technical Architecture Deep Dive

1
Comments
5 min read
Kafka server with SASL_OAUTHBEARER

Kafka server with SASL_OAUTHBEARER

Comments
1 min read
How to Manage Secrets Effectively Across Multiple Platforms with a Single Tool?

How to Manage Secrets Effectively Across Multiple Platforms with a Single Tool?

Comments
2 min read
Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

Comments
4 min read
Pushed Authorization Requests in .NET 9: Why and How to Use Them

Pushed Authorization Requests in .NET 9: Why and How to Use Them

Comments
8 min read
Completed the LFD121: Developing Secure Software course with The Linux Foundation!

Completed the LFD121: Developing Secure Software course with The Linux Foundation!

Comments
1 min read
Amass API - REST API Solution for Domain Reconnaissance

Amass API - REST API Solution for Domain Reconnaissance

Comments
2 min read
Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

Comments
3 min read
HashiCorp Vault Setup Guide for NEAR Protocol Accounts

HashiCorp Vault Setup Guide for NEAR Protocol Accounts

Comments
4 min read
Top 7 Kubernetes Certifications in 2025

Top 7 Kubernetes Certifications in 2025

Comments
2 min read
NPM command confusion

NPM command confusion

Comments
2 min read
Leading Docker Adoption: A Senior Manager’s Perspective

Leading Docker Adoption: A Senior Manager’s Perspective

3
Comments
2 min read
Can a Website Be Hacked in Under 10 Minutes? Understanding Web Security

Can a Website Be Hacked in Under 10 Minutes? Understanding Web Security

Comments
3 min read
Master Network Security: Protect Your Digital World from Hidden Threats! 👾

Master Network Security: Protect Your Digital World from Hidden Threats! 👾

Comments
3 min read
Closing the PKIX Working Group is, apparently, not news

Closing the PKIX Working Group is, apparently, not news

Comments
2 min read
Beyond the Random Class: Cryptographic Randomness in .NET 6+

Beyond the Random Class: Cryptographic Randomness in .NET 6+

Comments
7 min read
Enhance Your App's Security with OTP-Agent

Enhance Your App's Security with OTP-Agent

Comments
2 min read
3Mór: How we started with Valkyries and ended with a Goddess

3Mór: How we started with Valkyries and ended with a Goddess

1
Comments
2 min read
Como configurar 2FA em Servidores Linux

Como configurar 2FA em Servidores Linux

Comments
3 min read
Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Comments
6 min read
[jan2025] thm.jrpt-path. 3/n

[jan2025] thm.jrpt-path. 3/n

Comments
1 min read
Docker Scout: Your Container Security Companion - A Developer's Guide

Docker Scout: Your Container Security Companion - A Developer's Guide

2
Comments
3 min read
Eavesdropping Drones

Eavesdropping Drones

Comments
1 min read
Certificate Generation using OpenSSL locally

Certificate Generation using OpenSSL locally

Comments
2 min read
Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Comments
4 min read
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
Quality software = Secure software

Quality software = Secure software

Comments
3 min read
Auditing SQL Server Database Users, Logins, and Activity: A Comprehensive Guide

Auditing SQL Server Database Users, Logins, and Activity: A Comprehensive Guide

Comments
3 min read
Getting Started With Cerbos

Getting Started With Cerbos

Comments
7 min read
SQL Injection - In Just 5 Minutes!

SQL Injection - In Just 5 Minutes!

Comments
3 min read
Issue 79 of AWS Cloud Security Weekly

Issue 79 of AWS Cloud Security Weekly

1
Comments
1 min read
Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

1
Comments
1 min read
Best Practices for Securing REST APIs: Balancing Performance, Usability, and Security

Best Practices for Securing REST APIs: Balancing Performance, Usability, and Security

Comments
7 min read
How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

Comments
7 min read
The Speakeasy Door to Your Network - Port Knocking (1)

The Speakeasy Door to Your Network - Port Knocking (1)

Comments
3 min read
The Speakeasy Door to Your Network - Port Knocking (2)

The Speakeasy Door to Your Network - Port Knocking (2)

Comments
4 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 3

Migrando Aplicativos de uma Nuvem para Outra - Parte 3

Comments
3 min read
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
Fix Insufficient Logging & Monitoring in Laravel Easily

Fix Insufficient Logging & Monitoring in Laravel Easily

2
Comments
3 min read
Understanding Passkeys: The Behind-the-Scenes Magic of Passwordless Authentication

Understanding Passkeys: The Behind-the-Scenes Magic of Passwordless Authentication

Comments
2 min read
loading...