DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Rebuilding TensorFlow 2.8.4 on Ubuntu 22.04 to patch vulnerabilities

Rebuilding TensorFlow 2.8.4 on Ubuntu 22.04 to patch vulnerabilities

Comments
7 min read
** Autenticación en Aplicaciones Web: Explicado al estilo de Beavis & Butthead **🔐

** Autenticación en Aplicaciones Web: Explicado al estilo de Beavis & Butthead **🔐

Comments
8 min read
Upstream preview: Life after the xz utils backdoor hack

Upstream preview: Life after the xz utils backdoor hack

Comments
3 min read
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
How to secure a WordPress site: auditing and monitoring tools

How to secure a WordPress site: auditing and monitoring tools

3
Comments
8 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

Comments
10 min read
How AWS Shield Protects You From DDoS?

How AWS Shield Protects You From DDoS?

Comments
5 min read
DEVOPSDAYS: LET’S TALK SECURITY

DEVOPSDAYS: LET’S TALK SECURITY

1
Comments
1 min read
Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

1
Comments
2 min read
Row Level Security In SQL Server

Row Level Security In SQL Server

1
Comments
3 min read
Dotenvx with Docker, the better way to manage project environment variables with secrets

Dotenvx with Docker, the better way to manage project environment variables with secrets

3
Comments
9 min read
Amazon Macie to detect sensitive data from your S3 Buckets

Amazon Macie to detect sensitive data from your S3 Buckets

13
Comments
4 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
Securing the Cloud #30

Securing the Cloud #30

Comments
3 min read
Apple Face ID not working? Here's how to fix it

Apple Face ID not working? Here's how to fix it

1
Comments
2 min read
Securing Your Application: A Comprehensive Guide for Developers

Securing Your Application: A Comprehensive Guide for Developers

1
Comments
3 min read
Information Technology & Services: Streamlining Operations with Cloud Solutions

Information Technology & Services: Streamlining Operations with Cloud Solutions

Comments
2 min read
Boost your Cloud Security with Network ACLs in your VPC

Boost your Cloud Security with Network ACLs in your VPC

Comments
3 min read
BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security

Comments
6 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

Comments
3 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Security Protocol to connect AWS SES

Security Protocol to connect AWS SES

2
Comments
3 min read
Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

4
Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

1
Comments
3 min read
What is AWS Identity and Access Management (IAM)?

What is AWS Identity and Access Management (IAM)?

3
Comments
7 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
Blocking unsafe open source dependencies in pull requests with Minder and OSV.dev

Blocking unsafe open source dependencies in pull requests with Minder and OSV.dev

3
Comments
1 min read
Security considerations of configuration management

Security considerations of configuration management

7
Comments
4 min read
Security: You might want to quit peppering Passwords Now!

Security: You might want to quit peppering Passwords Now!

3
Comments
2 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
Detect AES in ECB mode

Detect AES in ECB mode

Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

2
Comments
8 min read
Easy AWS permissions for your EKS workloads: Pod Identity - An easy way to grant AWS access

Easy AWS permissions for your EKS workloads: Pod Identity - An easy way to grant AWS access

13
Comments
4 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

Comments
6 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

5
Comments
9 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

3
Comments
2 min read
Implementing Role Based Access Control in SvelteKit

Implementing Role Based Access Control in SvelteKit

26
Comments
12 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

4
Comments 1
2 min read
My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

2
Comments
5 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

2
Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
loading...