DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Metamorphic Code

Understanding Metamorphic Code

Comments
4 min read
Gaps in SOC Operator and Analyst Skillsets

Gaps in SOC Operator and Analyst Skillsets

Comments
3 min read
Prompt Fuzzer: how to keep your agents on the right path

Prompt Fuzzer: how to keep your agents on the right path

1
Comments
2 min read
Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

Laravel's most underrated security feature - What actually is a signed URL, and how do they work?

Comments
6 min read
Trick to get Free SSL certificate for azure application gateway

Trick to get Free SSL certificate for azure application gateway

Comments
2 min read
Building a Fort: Django Security Best Practices

Building a Fort: Django Security Best Practices

2
Comments
5 min read
Services that can integrate with AWS Certificate Manager and their Use Case

Services that can integrate with AWS Certificate Manager and their Use Case

Comments
3 min read
Introducing the Ultimate Password Generator: Your Key to Online Security

Introducing the Ultimate Password Generator: Your Key to Online Security

Comments
2 min read
Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comprehensive Guide to Optimizing WordPress Security: Tips and Best Practices

Comments
4 min read
Cracking GPT Assistants: Extracting Prompts and Associated Files

Cracking GPT Assistants: Extracting Prompts and Associated Files

Comments
1 min read
Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

Integrate Cloud Secrets with Kubernetes Secrets using External Secrets Through Terraform

Comments
3 min read
Securing Next.js APIs with Firebase Authentication

Securing Next.js APIs with Firebase Authentication

Comments
2 min read
Handling CVE-2018-20225

Handling CVE-2018-20225

Comments
7 min read
Configuring Security Settings in Umbraco: A Comprehensive Guide

Configuring Security Settings in Umbraco: A Comprehensive Guide

Comments
3 min read
Secure Your Django App with Parameterized Queries

Secure Your Django App with Parameterized Queries

Comments
3 min read
How NSX Data Center Enhances Network Security for Businesses

How NSX Data Center Enhances Network Security for Businesses

Comments
3 min read
The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

The Ultimate Guide to Designing Secure Systems: Best Practices for 2024

Comments
4 min read
Implement PKCS#7 padding

Implement PKCS#7 padding

Comments
3 min read
Security news weekly round-up - 17 May 2024

Security news weekly round-up - 17 May 2024

1
Comments
3 min read
The Containerization Brick for your Platform Engineering Toolbox

The Containerization Brick for your Platform Engineering Toolbox

Comments
3 min read
Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Building High-Performance, Secure Static Websites on a Budget with AWS and Terraform

Comments
6 min read
Guided Data Access Patterns: A Deal Breaker for Data Platforms

Guided Data Access Patterns: A Deal Breaker for Data Platforms

Comments
7 min read
HTTP / HTTPS Communication Protocol

HTTP / HTTPS Communication Protocol

4
Comments 1
8 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Test Automation in API Security Testing

Test Automation in API Security Testing

Comments
3 min read
Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Kickstart Your AWS IAM Security Journey: 9 Simple Practices to Implement.

Comments
2 min read
How to Hide the X-Powered-By Header in NestJS

How to Hide the X-Powered-By Header in NestJS

3
Comments 2
1 min read
Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

Unlocking the Magic of Zero-Knowledge Proofs: Keeping Secrets Safe

3
Comments
3 min read
Detect AES in ECB mode

Detect AES in ECB mode

Comments
3 min read
PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

PHP[TEK] 2024: Pioneering the Future of Web Development in Chicago

Comments
8 min read
Rapyd API Request Signatures in Java

Rapyd API Request Signatures in Java

2
Comments
8 min read
Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Python FastAPI: Integrating OAuth2 Security with the Application's Own Authentication Process

Comments
7 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
Removendo Dados Sensiveis de Images

Removendo Dados Sensiveis de Images

Comments
6 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Insights from HackSpaceCon 2024: Navigating Cybersecurity Challenges Ahead

Comments
8 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Build and host your own observability solution

Build and host your own observability solution

Comments
4 min read
picoCTF "Classic Crackme 0x100" Walkthrough

picoCTF "Classic Crackme 0x100" Walkthrough

Comments
13 min read
Implementing symmetric and asymmetric encryption with NodeJS

Implementing symmetric and asymmetric encryption with NodeJS

5
Comments
9 min read
Demo: Minder, a software supply chain security platform from Stacklok

Demo: Minder, a software supply chain security platform from Stacklok

Comments
1 min read
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Mastering Secure CI/CD for ECS with GitHub Actions

Mastering Secure CI/CD for ECS with GitHub Actions

40
Comments 2
7 min read
Issue 44 of AWS Cloud Security Weekly

Issue 44 of AWS Cloud Security Weekly

1
Comments
1 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

8
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

Comments
1 min read
Data Anonymization vs Synthetic Data

Data Anonymization vs Synthetic Data

3
Comments
2 min read
Security in Amazon Virtual Private Cloud

Security in Amazon Virtual Private Cloud

4
Comments 1
2 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

Securely connect via SSH without an SSH key (AWS/Google Cloud/Azure)

2
Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
AppArmor testsuite

AppArmor testsuite

Comments
1 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

5
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

1
Comments
8 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

6
Comments
3 min read
How to Install Drozer using Docker

How to Install Drozer using Docker

Comments
2 min read
loading...