DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

Comments
4 min read
Warn And Log Out User Due To Inactivity In Angular App

Warn And Log Out User Due To Inactivity In Angular App

Comments
3 min read
API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

API GOVERNANCE CHECKLIST FOR MANAGERS IN 2024

5
Comments
3 min read
Convert to workload identity federation

Convert to workload identity federation

Comments
2 min read
Interactive description of iptables tables

Interactive description of iptables tables

Comments
1 min read
Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Is Your PC Safe? How to Block Password Unlockers Like Chntpw in 2024💻🔐

Comments
4 min read
🤖 Building RAG chatbot with NeMo Guardrails !💡

🤖 Building RAG chatbot with NeMo Guardrails !💡

Comments
2 min read
🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

🚦 Stay Safe, Stay On Track: NeMo Guardrails ! 🔒

Comments
3 min read
Linux Command Lines That You Should Know!

Linux Command Lines That You Should Know!

Comments
2 min read
How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

How Zero Trust Empowers Secure Remote Teams (A CTO's Perspective)

Comments
4 min read
Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Learning Cyber Security For Programmers Day 3 —  Essential Cybersecurity Tools

Comments
2 min read
60 Years of the IBM System/360: A Legacy of Reliability and Security

60 Years of the IBM System/360: A Legacy of Reliability and Security

1
Comments 1
2 min read
How to Hack (and secure) Serverless Applications

How to Hack (and secure) Serverless Applications

3
Comments
6 min read
Creating Passkey Authentication in a Rails 7 Application

Creating Passkey Authentication in a Rails 7 Application

1
Comments
4 min read
DynamoDB now supports resource-based policies. But is that a good idea?

DynamoDB now supports resource-based policies. But is that a good idea?

Comments
5 min read
What is an authorization API?

What is an authorization API?

Comments
6 min read
What Kills Your Flash Drive and How You Can Avoid It?

What Kills Your Flash Drive and How You Can Avoid It?

1
Comments
3 min read
Terraform & HashiCorp Vault Integration: Seamless Secrets Management

Terraform & HashiCorp Vault Integration: Seamless Secrets Management

1
Comments
5 min read
Fundamental Concepts in Secure Environments

Fundamental Concepts in Secure Environments

Comments
2 min read
Security news weekly round-up - 22nd March 2024

Security news weekly round-up - 22nd March 2024

1
Comments
3 min read
Make your Azure OpenAI apps compliant with RBAC

Make your Azure OpenAI apps compliant with RBAC

16
Comments
6 min read
Demystifying OAuth 2.0 with a Clubbing Analogy

Demystifying OAuth 2.0 with a Clubbing Analogy

1
Comments
3 min read
Elevate Your DevOps and Cloud Engineering Journey

Elevate Your DevOps and Cloud Engineering Journey

Comments
4 min read
Securing the Cloud #23

Securing the Cloud #23

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — II

COMMON VULNERABILITIES: REENTRANCY PART — II

Comments
7 min read
COMMON VULNERABILITIES: REENTRANCY PART — I

COMMON VULNERABILITIES: REENTRANCY PART — I

Comments
7 min read
Navigating the Realm of Cloud Security on AWS

Navigating the Realm of Cloud Security on AWS

Comments
8 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
What is JWT ?

What is JWT ?

2
Comments
2 min read
WebAuthn Cheat Sheet for Developers

WebAuthn Cheat Sheet for Developers

Comments
2 min read
Best Practices for Configuring Rate Limits to Prevent DDoS

Best Practices for Configuring Rate Limits to Prevent DDoS

Comments
6 min read
What the heck is SSH

What the heck is SSH

4
Comments
1 min read
Compliant infrastructure using infrastructure as code

Compliant infrastructure using infrastructure as code

2
Comments
6 min read
10 Ways To Ensure Successful Mobile App Security

10 Ways To Ensure Successful Mobile App Security

1
Comments
4 min read
Ngrok: Exposing local server on the internet

Ngrok: Exposing local server on the internet

Comments
3 min read
Ask: Static Code Analysis Tools.

Ask: Static Code Analysis Tools.

Comments 2
1 min read
A rant on data breaches

A rant on data breaches

Comments
2 min read
Why adopt passkeys?

Why adopt passkeys?

3
Comments
5 min read
GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

GenAI-Powered Digital Threads - A Novel Approach to AI Security, Part I

Comments
5 min read
Loop DOS? Letś Discuss.

Loop DOS? Letś Discuss.

Comments
2 min read
Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Implementing a Robust Cybersecurity Strategy: The Role of Virtualized Security in Safeguarding Data

Comments
2 min read
Introduction to Cryptography in Python

Introduction to Cryptography in Python

Comments
2 min read
SnowFROC 2024: Securing The Future With OWASP Community In Denver

SnowFROC 2024: Securing The Future With OWASP Community In Denver

1
Comments
7 min read
Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Creating Custom Authorization Logic : 4-Step Guide Using AuthorizationHandlers

Comments
2 min read
How is Amazon Web Services ensuring AI is Securely handling Our Data?

How is Amazon Web Services ensuring AI is Securely handling Our Data?

1
Comments
5 min read
Securing TiddlyWiki with Pomerium

Securing TiddlyWiki with Pomerium

Comments
3 min read
Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Top 8 Mistakes New Coders Make (and How to Avoid Them Like a Pro)

Comments
5 min read
Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Takeaways from SANS 2024 AI Security Trends + Predictions 🔮

Comments
2 min read
Backdoor trap security in place yet?

Backdoor trap security in place yet?

1
Comments
2 min read
New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

New capabilities for New Relic Interactive Application Security Testing (IAST) 🔒

Comments
1 min read
Integrate an Audit Trail for NextAuth.js in a few lines of code

Integrate an Audit Trail for NextAuth.js in a few lines of code

Comments
3 min read
SecretService: Library for Storing Secrets in Google Apps Script

SecretService: Library for Storing Secrets in Google Apps Script

Comments
2 min read
Atlassian security incidents: 2023 in Review

Atlassian security incidents: 2023 in Review

Comments
8 min read
Lessons On Secrets Security From Datadog Research

Lessons On Secrets Security From Datadog Research

Comments
8 min read
Next.js: consequence of AppRouter on your CSP

Next.js: consequence of AppRouter on your CSP

Comments
3 min read
Preventing SQL Injection with Golang

Preventing SQL Injection with Golang

33
Comments 3
8 min read
How to implement HTTPS in Local Networks Using Let's Encrypt

How to implement HTTPS in Local Networks Using Let's Encrypt

20
Comments
14 min read
Simplify Configuration Management for Efficient Cloud Operations

Simplify Configuration Management for Efficient Cloud Operations

Comments
3 min read
Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Evaluating The GitGuardian Secrets Detection Platform: A Self-Guided Roadmap

Comments
6 min read
Issue 37 of AWS Cloud Security Weekly

Issue 37 of AWS Cloud Security Weekly

1
Comments
2 min read
loading...