DEV Community 👩‍💻👨‍💻

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What can be done with an IP address?

What can be done with an IP address?

Reactions 4 Comments
4 min read
How to encrypt data easily when your apps and databases are already running

How to encrypt data easily when your apps and databases are already running

Reactions 6 Comments
2 min read
Why should I care about SBOMs as a Software Developer ...

Why should I care about SBOMs as a Software Developer ...

Reactions 7 Comments 2
1 min read
HTML5 required and pattern are not a security feature

HTML5 required and pattern are not a security feature

Reactions 5 Comments
1 min read
How to Create and Configure Your Kubernetes Service Account

How to Create and Configure Your Kubernetes Service Account

Reactions 1 Comments
6 min read
How to virus scan file users upload using ClamAV

How to virus scan file users upload using ClamAV

Comments
2 min read
Reading saved firefox passwords via cli and other woes

Reading saved firefox passwords via cli and other woes

Reactions 3 Comments
4 min read
How to Address Sensitive Data Sprawl

How to Address Sensitive Data Sprawl

Reactions 3 Comments
7 min read
📌 Live - Diving into an NPM Package Vulnerability

📌 Live - Diving into an NPM Package Vulnerability

Reactions 7 Comments
2 min read
The risks of using vulnerable dependencies in your project, and how SCA helps manage them

The risks of using vulnerable dependencies in your project, and how SCA helps manage them

Comments
3 min read
10 best practices to containerize Node.js web applications with Docker

10 best practices to containerize Node.js web applications with Docker

Reactions 2 Comments
28 min read
Spin up secure HTTPS proxy in less than 10 minutes

Spin up secure HTTPS proxy in less than 10 minutes

Comments
5 min read
26 best practices to secure your cloud environment☁️🔥

26 best practices to secure your cloud environment☁️🔥

Reactions 32 Comments 2
15 min read
RPKI , securing BGP Infrastructure - with Lab

RPKI , securing BGP Infrastructure - with Lab

Reactions 3 Comments
9 min read
SSH Key-based Authentication

SSH Key-based Authentication

Reactions 3 Comments
5 min read
How to log in to multiple AWS accounts — the easy way

How to log in to multiple AWS accounts — the easy way

Comments
3 min read
Getting Started with Notary

Getting Started with Notary

Reactions 16 Comments
3 min read
How to Automate OWASP ZAP

How to Automate OWASP ZAP

Reactions 5 Comments 1
8 min read
Container Images for the Cloud Native Era

Container Images for the Cloud Native Era

Reactions 5 Comments 2
4 min read
Cherrybomb for OWASP Conference 😁 🥳

Cherrybomb for OWASP Conference 😁 🥳

Reactions 15 Comments
1 min read
O JavaScript não é seguro...

O JavaScript não é seguro...

Comments
5 min read
How !(not) to store passwords

How !(not) to store passwords

Comments
15 min read
26 AWS Security Best Practices to Adopt in Production

26 AWS Security Best Practices to Adopt in Production

Reactions 8 Comments
33 min read
How Does WebAuthn Work?

How Does WebAuthn Work?

Reactions 3 Comments 1
5 min read
Secrets in ArgoCD with Sops

Secrets in ArgoCD with Sops

Comments
2 min read
AWS + DevSecops

AWS + DevSecops

Reactions 10 Comments
6 min read
You Shall Not Pass: The Ins and Outs of Authentication

You Shall Not Pass: The Ins and Outs of Authentication

Reactions 5 Comments
7 min read
Protect Directories Using APACHE

Protect Directories Using APACHE

Reactions 1 Comments
2 min read
OWAST Top 10 vulnerabilities and how to approach them

OWAST Top 10 vulnerabilities and how to approach them

Reactions 6 Comments
10 min read
Linux EC2 Bastion Host with AWS CDK

Linux EC2 Bastion Host with AWS CDK

Comments
4 min read
Best practices for managing Java dependencies

Best practices for managing Java dependencies

Reactions 1 Comments
8 min read
Fixing potential security issues in your Infrastructure as Code at the source with Sysdig

Fixing potential security issues in your Infrastructure as Code at the source with Sysdig

Reactions 1 Comments
7 min read
Top 7 Authentication Providers for Building Apps With JWT (2022)

Top 7 Authentication Providers for Building Apps With JWT (2022)

Reactions 4 Comments
9 min read
We built the first always (!) encrypted K8s 🔐

We built the first always (!) encrypted K8s 🔐

Reactions 14 Comments
3 min read
Appwrite Loves Open Source: Why I Chose To Sponsor Offen

Appwrite Loves Open Source: Why I Chose To Sponsor Offen

Reactions 28 Comments 1
4 min read
AWS VPN: Avoid a large surprise bill by using this cost calculator.

AWS VPN: Avoid a large surprise bill by using this cost calculator.

Reactions 2 Comments
6 min read
How to sign your commits with GPG or SSH keys

How to sign your commits with GPG or SSH keys

Reactions 11 Comments
4 min read
Using Cognito groups to control access to API endpoints

Using Cognito groups to control access to API endpoints

Reactions 6 Comments
8 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

Reactions 1 Comments
4 min read
Environment variables & Its best practices

Environment variables & Its best practices

Reactions 1 Comments
4 min read
file validation in python Much easier and more reliable

file validation in python Much easier and more reliable

Reactions 3 Comments
1 min read
Ethernaut 27: Good Samaritan

Ethernaut 27: Good Samaritan

Comments
3 min read
Using Proxychains in JMeter

Using Proxychains in JMeter

Reactions 18 Comments
8 min read
DNS spoofing

DNS spoofing

Reactions 17 Comments 2
5 min read
Hack AWS S3 — Catch AWS Account!

Hack AWS S3 — Catch AWS Account!

Reactions 14 Comments 1
3 min read
How to hide a secret message in image?

How to hide a secret message in image?

Reactions 6 Comments
1 min read
Subscribe to a new newsletter for security-aware developers!

Subscribe to a new newsletter for security-aware developers!

Reactions 6 Comments
1 min read
Using Python to Flood Scammers with Fake Passwords

Using Python to Flood Scammers with Fake Passwords

Reactions 3 Comments
3 min read
Breaking Down Another Phishing Attempt

Breaking Down Another Phishing Attempt

Comments
7 min read
What's The Name of This Password Management Technique and is it a Good Idea?

What's The Name of This Password Management Technique and is it a Good Idea?

Reactions 16 Comments 12
2 min read
Admission Controllers in Action: Datree's Approach

Admission Controllers in Action: Datree's Approach

Reactions 10 Comments
6 min read
What is a reverse shell attack?!

What is a reverse shell attack?!

Reactions 3 Comments
6 min read
Speaker Free Pass Giveaway - DeveloperWeek Cloud 2022 (Sept 7-14)

Speaker Free Pass Giveaway - DeveloperWeek Cloud 2022 (Sept 7-14)

Reactions 8 Comments
1 min read
Auditing your python environment

Auditing your python environment

Comments
6 min read
Debunking myths about HTTPS

Debunking myths about HTTPS

Reactions 73 Comments 13
4 min read
How I found an S3 vulnerability in a $85 million funded startup and reported it ethically

How I found an S3 vulnerability in a $85 million funded startup and reported it ethically

Reactions 1 Comments
4 min read
How to Secure your API Gateway

How to Secure your API Gateway

Comments
3 min read
What is Authorization service and why does it matter?

What is Authorization service and why does it matter?

Reactions 124 Comments 4
5 min read
How (not) to store passwords

How (not) to store passwords

Reactions 39 Comments 13
4 min read
Update Cheat Sheet for Developers

Update Cheat Sheet for Developers

Reactions 9 Comments
3 min read
loading...