DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
8 Essential WordPress Security Plugins to Keep Your Site Protected

8 Essential WordPress Security Plugins to Keep Your Site Protected

1
Comments
3 min read
Unlocking efficient authZ with Cerbos’ Query Plan

Unlocking efficient authZ with Cerbos’ Query Plan

2
Comments
5 min read
Navigating the Dark Corners of the Internet with a Beacon of Hope

Navigating the Dark Corners of the Internet with a Beacon of Hope

2
Comments
2 min read
Five open-source projects to secure access to your applications

Five open-source projects to secure access to your applications

1
Comments
5 min read
Discover the key differences between AWS WAF, ACLs, and Security Groups to protect your cloud applications like a pro!

Discover the key differences between AWS WAF, ACLs, and Security Groups to protect your cloud applications like a pro!

Comments
4 min read
Take the first steps to harden your Kubernetes cluster

Take the first steps to harden your Kubernetes cluster

Comments
8 min read
Meet the Team: Matthias & Knowledge Transfer

Meet the Team: Matthias & Knowledge Transfer

4
Comments
7 min read
OSCM: The Open Source Consumption Manifesto

OSCM: The Open Source Consumption Manifesto

4
Comments
5 min read
Vault Associate Certification (Part 6): Utilize Vault CLI

Vault Associate Certification (Part 6): Utilize Vault CLI

Comments
8 min read
Hunting Broken Social Media Links with Go

Hunting Broken Social Media Links with Go

Comments
7 min read
🛡️The Ultimate Defense: Introduction to Spring Security 🔐

🛡️The Ultimate Defense: Introduction to Spring Security 🔐

1
Comments
3 min read
What is Devops

What is Devops

1
Comments
2 min read
A Beginner’s Guide to Authentication and Authorization in Rails

A Beginner’s Guide to Authentication and Authorization in Rails

Comments
10 min read
What is an OSPO and why is it important?

What is an OSPO and why is it important?

2
Comments
10 min read
OpenBSD acme-client で Let's Encrypt 証明書を取得する

OpenBSD acme-client で Let's Encrypt 証明書を取得する

9
Comments
4 min read
URI vs URL: The real difference between the two

URI vs URL: The real difference between the two

1
Comments
2 min read
Most happening place - AWS VPC Subnets

Most happening place - AWS VPC Subnets

8
Comments
2 min read
BSidesLV: The big event before the biggest security event in Las Vegas

BSidesLV: The big event before the biggest security event in Las Vegas

Comments
11 min read
Using Technology to Enhance Bitcoin Tracing

Using Technology to Enhance Bitcoin Tracing

3
Comments 1
2 min read
Cybersecurity In The World Of Generative AI

Cybersecurity In The World Of Generative AI

1
Comments 2
2 min read
Why you need Interactive Application Security Testing (IAST) 🔒

Why you need Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Top 10 Password Hacking Tools for 2023

Top 10 Password Hacking Tools for 2023

8
Comments
11 min read
What is Cyber Security and why is it needed?

What is Cyber Security and why is it needed?

6
Comments
4 min read
GitLab Outage vs. Continuous Code Development

GitLab Outage vs. Continuous Code Development

Comments
4 min read
Everything People Don't Get About CVEs

Everything People Don't Get About CVEs

2
Comments
6 min read
Authentication Orientation

Authentication Orientation

2
Comments
5 min read
Vault Associate Certification (Part 5): Compare and configure Vault secrets engines

Vault Associate Certification (Part 5): Compare and configure Vault secrets engines

7
Comments
11 min read
Avoid Smart Contract Hacks with Fuzz Testing

Avoid Smart Contract Hacks with Fuzz Testing

10
Comments
6 min read
Core to your Global Presence - AWS VPC

Core to your Global Presence - AWS VPC

8
Comments
2 min read
Shadow API Adoption Skyrockets 900%! 🚀

Shadow API Adoption Skyrockets 900%! 🚀

15
Comments 3
2 min read
Securing the Connection to S3 from EC2

Securing the Connection to S3 from EC2

10
Comments
7 min read
API keys vs tokens - what’s the difference?

API keys vs tokens - what’s the difference?

5
Comments
4 min read
Researcher finds GitHub admin credentials of car company thanks to misconfiguration

Researcher finds GitHub admin credentials of car company thanks to misconfiguration

4
Comments
6 min read
Perl Stream Cipher

Perl Stream Cipher

1
Comments
1 min read
Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

13
Comments
12 min read
Exploring Blockchain's Role in the Metaverse

Exploring Blockchain's Role in the Metaverse

Comments
3 min read
Online Security - A Simple Guide

Online Security - A Simple Guide

Comments
4 min read
Securing Your Data: AWS S3 Bucket Security Best Practices

Securing Your Data: AWS S3 Bucket Security Best Practices

6
Comments 1
4 min read
Wanna uncover sneaky APIs with us? 🐱‍👤 👀

Wanna uncover sneaky APIs with us? 🐱‍👤 👀

24
Comments
1 min read
Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks

Comments
10 min read
Vault Associate Certification (Part 4): Manage Vault leases

Vault Associate Certification (Part 4): Manage Vault leases

1
Comments
4 min read
Testing Banking Apps: Ensuring Security, Functionality, and User Experience

Testing Banking Apps: Ensuring Security, Functionality, and User Experience

5
Comments
4 min read
Using Laravel Policy with middleware to protect routes

Using Laravel Policy with middleware to protect routes

2
Comments 2
2 min read
Math for Devs - Encryption Essentials

Math for Devs - Encryption Essentials

8
Comments 1
6 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
IP Info was a mistake, and how digging for the source of the problem is tricky

IP Info was a mistake, and how digging for the source of the problem is tricky

9
Comments
3 min read
Networking for offensive security {0.1}

Networking for offensive security {0.1}

1
Comments
3 min read
Automating AWS Prowler Scans

Automating AWS Prowler Scans

11
Comments
9 min read
Creating a Private Endpoint for Azure Storage Account using Terraform

Creating a Private Endpoint for Azure Storage Account using Terraform

2
Comments
4 min read
Implementing item-level access control to DynamoDB tables

Implementing item-level access control to DynamoDB tables

6
Comments
9 min read
Secure database access from web apps

Secure database access from web apps

13
Comments
7 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

12
Comments
5 min read
Securing Your Code with GitHub

Securing Your Code with GitHub

26
Comments 1
7 min read
For Devops necessary Tools and Technology

For Devops necessary Tools and Technology

2
Comments
2 min read
A Humble Guide to a Password Authentication Implementation

A Humble Guide to a Password Authentication Implementation

2
Comments
4 min read
Everything you need to know about JSON Web Token

Everything you need to know about JSON Web Token

10
Comments
32 min read
[GameDev] Unity3D, C# and String Security

[GameDev] Unity3D, C# and String Security

6
Comments
14 min read
Diving into AWS - Understanding IAM

Diving into AWS - Understanding IAM

8
Comments 1
8 min read
Efficient Data Management with Frozen Shards Decider in Elastic-search

Efficient Data Management with Frozen Shards Decider in Elastic-search

2
Comments 1
3 min read
What's new and noteworthy on AWS - Summer 2023 edition

What's new and noteworthy on AWS - Summer 2023 edition

5
Comments
24 min read
loading...