DEV Community 👩‍💻👨‍💻

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Architecting for Security: MySQL Edition

Architecting for Security: MySQL Edition

Reactions 2 Comments
10 min read
ESXiArgs encryption malware launches massive attacks against VMware ESXi servers

ESXiArgs encryption malware launches massive attacks against VMware ESXi servers

Reactions 7 Comments
3 min read
Our guide to the AWS Security Pillar

Our guide to the AWS Security Pillar

Reactions 1 Comments
7 min read
Integrity Check using PGP for JMeter

Integrity Check using PGP for JMeter

Reactions 1 Comments
8 min read
Deep dive into Amazon Inspector for AWS Lambda

Deep dive into Amazon Inspector for AWS Lambda

Reactions 4 Comments
4 min read
Como deixar seu projeto mais seguro com Dependabot

Como deixar seu projeto mais seguro com Dependabot

Reactions 9 Comments 3
4 min read
1Password CLI, AWS and Terraform

1Password CLI, AWS and Terraform

Reactions 2 Comments
2 min read
A story about one DDOS attack and methods of protecting Juniper routing engine

A story about one DDOS attack and methods of protecting Juniper routing engine

Comments
22 min read
Your extraordinary one time secret

Your extraordinary one time secret

Comments
3 min read
Passing AWS Security Specialty Exam — My Tips and Notes

Passing AWS Security Specialty Exam — My Tips and Notes

Reactions 7 Comments 2
5 min read
Generate Strong and Secure Passwords with Go: A Step-by-Step Guide 🔐👨‍💻

Generate Strong and Secure Passwords with Go: A Step-by-Step Guide 🔐👨‍💻

Reactions 2 Comments
4 min read
Mastering GPG: The Essential Tool for Secure Communications in Software Development

Mastering GPG: The Essential Tool for Secure Communications in Software Development

Reactions 2 Comments
4 min read
5 Creative Uses of Magic Links

5 Creative Uses of Magic Links

Reactions 3 Comments
5 min read
Kube-bench and Popeye: A Power Duo for AKS Security Compliance

Kube-bench and Popeye: A Power Duo for AKS Security Compliance

Reactions 1 Comments
29 min read
The uncrackable back door : The intersection of mathematics, AI, politics and ethics

The uncrackable back door : The intersection of mathematics, AI, politics and ethics

Reactions 2 Comments
8 min read
API Authentication In Depth

API Authentication In Depth

Reactions 4 Comments
7 min read
7 Tips for Low-Friction Authentication

7 Tips for Low-Friction Authentication

Reactions 3 Comments
9 min read
Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Top 5 fails when developing a DiGA backend (German Digital Therapeutics – DTx)

Comments
7 min read
LUKS Encrypt Raspberry PI

LUKS Encrypt Raspberry PI

Reactions 2 Comments
2 min read
6 Tips to Use SSH Client Effectively For Connecting To Linux Servers

6 Tips to Use SSH Client Effectively For Connecting To Linux Servers

Reactions 7 Comments 4
5 min read
How to secure a web server (VPS)

How to secure a web server (VPS)

Reactions 1 Comments
8 min read
HR Technology Trends in 2023: Digitalization with a Human Touch

HR Technology Trends in 2023: Digitalization with a Human Touch

Reactions 4 Comments
11 min read
Open Policy Agent with Kubernetes - Tutorial (Pt. 1)

Open Policy Agent with Kubernetes - Tutorial (Pt. 1)

Comments
7 min read
Hacked Server

Hacked Server

Comments
3 min read
What is the ideal session timeout?

What is the ideal session timeout?

Reactions 1 Comments
1 min read
Accessing Symfony security user on the background

Accessing Symfony security user on the background

Reactions 2 Comments
2 min read
I've created a full-stack user permission model, should I go open-source?

I've created a full-stack user permission model, should I go open-source?

Reactions 3 Comments
4 min read
Authenticate using Auth0

Authenticate using Auth0

Reactions 5 Comments
1 min read
Password Hashing in Node.js Using bcryptjs Library.

Password Hashing in Node.js Using bcryptjs Library.

Reactions 4 Comments 1
6 min read
Token Gating Websites with Collab.Land

Token Gating Websites with Collab.Land

Comments
2 min read
Must know — Container Security Constructs: Namespace, SecComp, Control Groups, SELinux

Must know — Container Security Constructs: Namespace, SecComp, Control Groups, SELinux

Reactions 5 Comments
2 min read
How to choose an Authorization Service?

How to choose an Authorization Service?

Reactions 3 Comments
5 min read
Composable Apps security practices with Entando on Kubernetes, featuring Ippon expert

Composable Apps security practices with Entando on Kubernetes, featuring Ippon expert

Reactions 3 Comments
2 min read
Big picture of what Auth is

Big picture of what Auth is

Reactions 4 Comments
3 min read
Whitelist IP addresses for Lambda function URLs

Whitelist IP addresses for Lambda function URLs

Comments
3 min read
Streamlining incident response investigations with Steampipe relationship graphs

Streamlining incident response investigations with Steampipe relationship graphs

Reactions 2 Comments
4 min read
New Managed Policies for Amazon Detective

New Managed Policies for Amazon Detective

Comments
2 min read
Secret Management in Kubernetes: Approaches, Tools, and Best Practices

Secret Management in Kubernetes: Approaches, Tools, and Best Practices

Reactions 1 Comments
9 min read
Encrypt and Decrypt Data in Node.js using aes-256-cbc

Encrypt and Decrypt Data in Node.js using aes-256-cbc

Reactions 3 Comments 2
6 min read
Allow access to REST API Gateway from specific IP addresses | Whitelist IPs

Allow access to REST API Gateway from specific IP addresses | Whitelist IPs

Reactions 2 Comments 2
3 min read
Active Record Encryption and Rollover with ENV's instead of credentials

Active Record Encryption and Rollover with ENV's instead of credentials

Reactions 1 Comments
2 min read
XSS Under The Radar

XSS Under The Radar

Reactions 4 Comments
4 min read
5 Application Security Tips for Developers

5 Application Security Tips for Developers

Reactions 2 Comments
4 min read
Docker Best Practices: Security

Docker Best Practices: Security

Reactions 4 Comments 1
4 min read
Build Networks with VLANs

Build Networks with VLANs

Reactions 3 Comments
13 min read
3 reasons why any website's security is important

3 reasons why any website's security is important

Reactions 4 Comments
4 min read
Generate SSH key pair on Git Bash in 2 Steps

Generate SSH key pair on Git Bash in 2 Steps

Comments
1 min read
Fetching Google Groups with SlashID SSO

Fetching Google Groups with SlashID SSO

Reactions 1 Comments
4 min read
Avoiding Security Vulnerabilities: The tx.origin vs msg.sender Debate

Avoiding Security Vulnerabilities: The tx.origin vs msg.sender Debate

Reactions 1 Comments
4 min read
Access TiDB Cloud by Hashicorp Vault

Access TiDB Cloud by Hashicorp Vault

Comments
4 min read
#DevDiscuss: Passwordless Authentication

#DevDiscuss: Passwordless Authentication

Reactions 29 Comments 29
1 min read
SAST: how code analysis tools look for security flaws

SAST: how code analysis tools look for security flaws

Comments
14 min read
How to Set Up a Proxy Server in React | Dealing with CORS

How to Set Up a Proxy Server in React | Dealing with CORS

Reactions 10 Comments 2
4 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

Protegendo sua API NodeJs contra ReDos Attack[Parte 1]

Reactions 1 Comments
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

Protegendo sua API NodeJs contra ReDos Attack[Parte 2]

Reactions 1 Comments
6 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

Reactions 1 Comments
5 min read
Deliver perfect HTTP security headers with AWS CloudFront

Deliver perfect HTTP security headers with AWS CloudFront

Reactions 19 Comments
4 min read
The Role of Key Management in Database Encryption

The Role of Key Management in Database Encryption

Reactions 3 Comments
4 min read
Creating a secure API architecture in Rails with few example

Creating a secure API architecture in Rails with few example

Reactions 8 Comments
7 min read
How to Deal with Compromised access in AWS

How to Deal with Compromised access in AWS

Comments
2 min read
loading...