DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Basics: A Beginner's Guide

Cybersecurity Basics: A Beginner's Guide

Comments
4 min read
Discovering the Latest Features of AWS CloudFront: Enhancing Performance and Security

Discovering the Latest Features of AWS CloudFront: Enhancing Performance and Security

Comments
4 min read
Why Using POST for Updates Is Safer Than Hyperlinks

Why Using POST for Updates Is Safer Than Hyperlinks

Comments
2 min read
Securing .NET Core API from DDoS Attack.

Securing .NET Core API from DDoS Attack.

Comments
5 min read
16 Soruda Blockchain Güvenliği Nedir Ve Nasıl Sağlanır? 🔥

16 Soruda Blockchain Güvenliği Nedir Ve Nasıl Sağlanır? 🔥

Comments
7 min read
Harnessing the Power of AWS Security Services

Harnessing the Power of AWS Security Services

Comments
2 min read
[pt-BR] Configurando um scanner antimalware para WordPress em Docker

[pt-BR] Configurando um scanner antimalware para WordPress em Docker

Comments
3 min read
AI Summit Vancouver 2024: Exploring AI's Role, Risks, and Transformative Power

AI Summit Vancouver 2024: Exploring AI's Role, Risks, and Transformative Power

Comments
7 min read
Building a SSL Certificate Monitor (to check a validity date)

Building a SSL Certificate Monitor (to check a validity date)

Comments
2 min read
Introducing the Multi-Version PYZ Builder: Secure, Cross-Platform Python Modules Made Easy

Introducing the Multi-Version PYZ Builder: Secure, Cross-Platform Python Modules Made Easy

Comments
4 min read
Secure transfer

Secure transfer

Comments
2 min read
Understanding Upwork's Security Systems: A Deep Technical Dive

Understanding Upwork's Security Systems: A Deep Technical Dive

21
Comments 4
2 min read
Por que a Polícia Federal conseguiu recuperar o vídeo 'deletado' do Mauro CID?

Por que a Polícia Federal conseguiu recuperar o vídeo 'deletado' do Mauro CID?

Comments
6 min read
User Authentication 🔑: Your Ultimate Digital Shield ! 🛡️

User Authentication 🔑: Your Ultimate Digital Shield ! 🛡️

1
Comments
2 min read
Cloud Security Measures

Cloud Security Measures

1
Comments
2 min read
Security news weekly round-up - 22nd November 2024

Security news weekly round-up - 22nd November 2024

1
Comments
2 min read
Insecure Direct Object References (IDOR) in Laravel

Insecure Direct Object References (IDOR) in Laravel

Comments
4 min read
How to mitigate a DDoS attack on a small server

How to mitigate a DDoS attack on a small server

Comments
2 min read
Security iOS Apps with OWASP Best Practices for Data Protection

Security iOS Apps with OWASP Best Practices for Data Protection

Comments
5 min read
Introducing Fleek Machines (Early Access): One Click Verified and Private Compute

Introducing Fleek Machines (Early Access): One Click Verified and Private Compute

2
Comments 1
2 min read
php.ini Overview: Boost Performance, Security, and Flexibility

php.ini Overview: Boost Performance, Security, and Flexibility

Comments
2 min read
Web vulnerability bounty rules update

Web vulnerability bounty rules update

Comments
1 min read
Some handy notes for GCP pentesting

Some handy notes for GCP pentesting

Comments
1 min read
Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud

Introducing the Local Python Code Protector: Secure Your Python Scripts Without the Cloud

Comments
4 min read
🔐 Why Your Team Needs Passbolt for Password Management

🔐 Why Your Team Needs Passbolt for Password Management

Comments
1 min read
Reimagining cybersecurity for developers

Reimagining cybersecurity for developers

Comments
6 min read
Why Security Testing is Crucial for Businesses in the USA

Why Security Testing is Crucial for Businesses in the USA

Comments
5 min read
FUTURE OF TECHNOLOGY

FUTURE OF TECHNOLOGY

1
Comments
2 min read
🐾 Kali Linux: The Penetration Testing and Security Auditing OS

🐾 Kali Linux: The Penetration Testing and Security Auditing OS

1
Comments
2 min read
What is Cloud Workload Security

What is Cloud Workload Security

Comments
2 min read
Open-Source != Transparency

Open-Source != Transparency

3
Comments 2
3 min read
Crypto/Web3 Scammers in LinkedIn 😈

Crypto/Web3 Scammers in LinkedIn 😈

Comments
2 min read
These Two Tools Helped Me Earn $40K in Bounties

These Two Tools Helped Me Earn $40K in Bounties

Comments
2 min read
Mario Rojas Espino: Liderazgo Ambiental y Desarrollo Sostenible en Guatemala

Mario Rojas Espino: Liderazgo Ambiental y Desarrollo Sostenible en Guatemala

Comments
2 min read
The Essential Features of Modern Physical Security Systems

The Essential Features of Modern Physical Security Systems

Comments
6 min read
I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

I want to compile and install Snort on Mac OS (12.7.4) without segmentation fault. Are there any steps or guides for this?

Comments
1 min read
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies

Comments
1 min read
Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Sharing Secrets Between Kubernetes Clusters Using external-secrets PushSecret

Comments
6 min read
Streamline Your Organization Security Posture with NIST CSF 2.0

Streamline Your Organization Security Posture with NIST CSF 2.0

Comments
12 min read
Common Website Security Risks and How to Avoid Them

Common Website Security Risks and How to Avoid Them

Comments
5 min read
Implement Unrecognized Device Login Alerts in React

Implement Unrecognized Device Login Alerts in React

Comments
3 min read
LINUX CHALLENGE DAY 5

LINUX CHALLENGE DAY 5

Comments 3
1 min read
Turning Ideas into Art: Texas Animation Studios You Should Know

Turning Ideas into Art: Texas Animation Studios You Should Know

Comments
5 min read
Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Introducing the PII Mask Maven Dependency: Secure Your JSON Data with Ease

Comments
2 min read
SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

Comments
7 min read
How to Use Kubernetes CronJob

How to Use Kubernetes CronJob

5
Comments
6 min read
[2024 Thanksgiving] Security Technology Research Writing Activity

[2024 Thanksgiving] Security Technology Research Writing Activity

Comments
1 min read
Understanding the different types of SSH Keys

Understanding the different types of SSH Keys

7
Comments
3 min read
Kubernetes Custom Resources

Kubernetes Custom Resources

6
Comments
7 min read
Authentication vs. Authorization: Key Differences and Security Risks Explained

Authentication vs. Authorization: Key Differences and Security Risks Explained

Comments
2 min read
Threat Modeling for Non-Security Experts

Threat Modeling for Non-Security Experts

Comments
5 min read
Understanding JWT Security Principle

Understanding JWT Security Principle

Comments
2 min read
Schema Validation in Amazon DynamoDB

Schema Validation in Amazon DynamoDB

Comments
2 min read
Working with Git Remotes

Working with Git Remotes

7
Comments
6 min read
Security by Design: Building Trust in Blockchain, One Block at a Time

Security by Design: Building Trust in Blockchain, One Block at a Time

Comments
2 min read
Hardware Security Modules: Preparing for the Post-Quantum Era

Hardware Security Modules: Preparing for the Post-Quantum Era

Comments
5 min read
Understanding QR Codes and Choosing the Best QR Code Generators

Understanding QR Codes and Choosing the Best QR Code Generators

1
Comments 1
3 min read
Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Migrando Aplicativos de uma Nuvem para Outra - Parte 1

Comments
4 min read
How to Debug Ansible Playbooks

How to Debug Ansible Playbooks

5
Comments
6 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
loading...