DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Leverage IP Data for Dynamic User Access Management 🌐

Leverage IP Data for Dynamic User Access Management 🌐

20
Comments 1
4 min read
Lithe Hash: A Robust Module for Secure Password Hashing

Lithe Hash: A Robust Module for Secure Password Hashing

3
Comments
3 min read
What is VPC Flow Log ? How to Enable VPC Log

What is VPC Flow Log ? How to Enable VPC Log

Comments
2 min read
OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

OWASP Global AppSec SF 2024: Empowering Developer Security As A Community

Comments
14 min read
Unlock Ultimate Security: How to Use YubiKey (or Any Security Key) for Passwordless Access in Azure Virtual Machines!

Unlock Ultimate Security: How to Use YubiKey (or Any Security Key) for Passwordless Access in Azure Virtual Machines!

Comments
3 min read
Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Fleet & CIS Benchmarks: Simplified, Cross-Platform Security

Comments
3 min read
Protecting Your Application with CSRF in Lithe

Protecting Your Application with CSRF in Lithe

3
Comments
4 min read
The Rise of AI in Cybersecurity: Opportunities and Challenges

The Rise of AI in Cybersecurity: Opportunities and Challenges

Comments
2 min read
Meme Monday

Meme Monday

5
Comments
1 min read
Bypassing Bot Detection Software with Selenium in Python

Bypassing Bot Detection Software with Selenium in Python

Comments
2 min read
How to Safely Delete Local and Remote Branches in Git

How to Safely Delete Local and Remote Branches in Git

7
Comments 1
5 min read
𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

𝖤𝗇𝖼𝗋𝗒𝗉𝗍𝗂𝗈𝗇 𝖺𝗇𝖽 𝖧𝖺𝗌𝗁𝗂𝗇𝗀: 𝖧𝗈𝗐 𝖳𝗁𝖾𝗒 𝖯𝗋𝗈𝗍𝖾𝖼𝗍 𝖸𝗈𝗎𝗋 𝖣𝖺𝗍𝖺 𝖣𝗂𝖿𝖿𝖾𝗋𝖾𝗇𝗍𝗅𝗒

Comments
2 min read
Advanced JWT Exploitation Techniques: Going Beyond the Basics

Advanced JWT Exploitation Techniques: Going Beyond the Basics

Comments
5 min read
What Does a Cyber Security Analyst Do?

What Does a Cyber Security Analyst Do?

Comments
2 min read
Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Comments
2 min read
Mseal in Linux: An un-hackable solution?

Mseal in Linux: An un-hackable solution?

1
Comments
3 min read
The Human Hack: When Cybercriminals Become Master Manipulators

The Human Hack: When Cybercriminals Become Master Manipulators

Comments
2 min read
Kubernetes Probes

Kubernetes Probes

13
Comments
6 min read
Disable password expiration in Windows

Disable password expiration in Windows

Comments
1 min read
Understanding Git Tags and Checkout

Understanding Git Tags and Checkout

8
Comments 1
7 min read
🔒 Protégez votre site WordPress : Sécurité et Backup, les indispensables pour bien débuter 🔒

🔒 Protégez votre site WordPress : Sécurité et Backup, les indispensables pour bien débuter 🔒

1
Comments
2 min read
What is CDR?

What is CDR?

Comments
3 min read
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Comments
1 min read
10 LLM Security Tools to Know in 2024

10 LLM Security Tools to Know in 2024

Comments
1 min read
Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Two Unconventional Ways to store Passwords: Honeywords & Rock Salt

Comments
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It

OAuth2 Client Credentials Grant Type: When and How to Use It

Comments
4 min read
OAuth2 vs. OpenID Connect: Understanding the Differences

OAuth2 vs. OpenID Connect: Understanding the Differences

Comments
3 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Comments
4 min read
Spring Security: Implementing JWT Authentication in Your Java Application

Spring Security: Implementing JWT Authentication in Your Java Application

Comments
4 min read
Why You Should Be Using a Password Manager

Why You Should Be Using a Password Manager

Comments
3 min read
Understanding VPNs: How They Work and Why You Need One

Understanding VPNs: How They Work and Why You Need One

Comments
4 min read
Passwordless Authentication

Passwordless Authentication

Comments
3 min read
When to Start Secret Rotation

When to Start Secret Rotation

Comments
2 min read
Securing Software Development with Secrets Vaults: A Comprehensive Guide

Securing Software Development with Secrets Vaults: A Comprehensive Guide

Comments
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
Securing Your Spring Boot Application with Spring Security

Securing Your Spring Boot Application with Spring Security

2
Comments
4 min read
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

Comments
3 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Comments
5 min read
Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Comments
2 min read
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Comments
3 min read
OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
JSON Web Tokens (JWTs): A Comprehensive Guide

JSON Web Tokens (JWTs): A Comprehensive Guide

Comments
3 min read
Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
What does CORS really do? 🤔

What does CORS really do? 🤔

Comments
3 min read
Beware of Spring Boot Actuator Endpoint env: A Security Alert

Beware of Spring Boot Actuator Endpoint env: A Security Alert

1
Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
[Série Auth/Aut] Introduction : l'importance du contrôle d'accès

[Série Auth/Aut] Introduction : l'importance du contrôle d'accès

5
Comments
5 min read
Essential SQL Database Security Practices to Protect Your Data

Essential SQL Database Security Practices to Protect Your Data

Comments
4 min read
5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments
4 min read
APIs and Security Best Practices: JavaScript and Python Examples

APIs and Security Best Practices: JavaScript and Python Examples

1
Comments
5 min read
Understanding "working-directory" in GitHub Actions

Understanding "working-directory" in GitHub Actions

6
Comments
3 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments
2 min read
Access Microsoft 365 resources from custom on premise application

Access Microsoft 365 resources from custom on premise application

1
Comments 1
9 min read
Sidecar Containers in Kubernetes

Sidecar Containers in Kubernetes

Comments
7 min read
How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

Comments
11 min read
Automating CI/CD Pipeline Migration with GitHub Actions Importer

Automating CI/CD Pipeline Migration with GitHub Actions Importer

8
Comments
5 min read
A Guide to Root Access for AWS S3 Buckets

A Guide to Root Access for AWS S3 Buckets

1
Comments
3 min read
Wireless Security Configuration: Protect Your Network Now!

Wireless Security Configuration: Protect Your Network Now!

Comments
3 min read
loading...