DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding the Difference Between Digital Signature vs. Digital Certificate

Understanding the Difference Between Digital Signature vs. Digital Certificate

5
Comments
7 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Detect AES in ECB mode

Detect AES in ECB mode

Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

2
Comments
8 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Comments
7 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

Deepfake Nightmares: Mitigating the Threat of AI-Fueled Masquerade Attacks

2
Comments
2 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
Password Management: Passwordless Login

Password Management: Passwordless Login

2
Comments
8 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

Comments
13 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

5
Comments
9 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
Looking to beef up the security of your AWS EC2 instances? 02:30

Looking to beef up the security of your AWS EC2 instances?

3
Comments
1 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
Securing the Cloud #28

Securing the Cloud #28

Comments
4 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

8
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

3
Comments
2 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

4
Comments 1
2 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

2
Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
AppArmor testsuite

AppArmor testsuite

Comments
1 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

5
Comments
3 min read
JavaScript Security: Simple Practices to Secure Your Frontend

JavaScript Security: Simple Practices to Secure Your Frontend

39
Comments 3
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

1
Comments
8 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

6
Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

Comments
2 min read
OWASP Amass

OWASP Amass

Comments
2 min read
Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

1
Comments 1
2 min read
Update! Interactive description of iptables tables

Update! Interactive description of iptables tables

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
11 API Trends to Watch for in 2024

11 API Trends to Watch for in 2024

Comments
7 min read
Configure Renovate to handle nuspec files

Configure Renovate to handle nuspec files

Comments
2 min read
Configure Renovate to update preview versions of NuGet packages

Configure Renovate to update preview versions of NuGet packages

Comments
2 min read
Keeping Your Microservices Safe: Best Practices and Patterns

Keeping Your Microservices Safe: Best Practices and Patterns

Comments
3 min read
Remotely Access Your Home Assistant Instance Securely

Remotely Access Your Home Assistant Instance Securely

Comments
6 min read
Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Protect Your API-Endpoints in Next.js 14 with the Chain of Responsibility Pattern.

Comments
4 min read
Security news weekly round-up - 3rd May 2024

Security news weekly round-up - 3rd May 2024

1
Comments
3 min read
Why IMDSv1 is a Security Risk for Cloud Infrastructure

Why IMDSv1 is a Security Risk for Cloud Infrastructure

1
Comments
4 min read
AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

AWS Lambda Serverless Security. Mistakes, Oversights, and Potential Vulnerabilities

Comments
8 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
loading...