DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

Comments
2 min read
Usando PAM no Linux

Usando PAM no Linux

1
Comments
4 min read
Security news weekly round-up - 12th July 2024

Security news weekly round-up - 12th July 2024

Comments
4 min read
How to avoid one of the biggest risks in mobile security as an iOS developer

How to avoid one of the biggest risks in mobile security as an iOS developer

Comments
6 min read
Intersection of AI and Data Privacy

Intersection of AI and Data Privacy

1
Comments
4 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Enhancing PostgreSQL Security with the Credcheck Extension

Enhancing PostgreSQL Security with the Credcheck Extension

Comments
1 min read
Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

1
Comments
3 min read
Foremost ที่ไม่ใช่ นม

Foremost ที่ไม่ใช่ นม

Comments
1 min read
Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

Building a Multi-Layered Docker Image Testing Framework with Docker Scout and Testcontainers

2
Comments
2 min read
Creating Cross-Account DynamoDB Backups with Terraform

Creating Cross-Account DynamoDB Backups with Terraform

1
Comments
4 min read
VaultWarden: Your local password manager

VaultWarden: Your local password manager

1
Comments
5 min read
From Privacy Pioneers to Digital Guardians: Tracing the Evolution of Privacy Regulations

From Privacy Pioneers to Digital Guardians: Tracing the Evolution of Privacy Regulations

Comments
2 min read
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

2
Comments
8 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Comments
2 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
Comments
6 min read
VerifyVault v0.4 has been RELEASED! 🚀

VerifyVault v0.4 has been RELEASED! 🚀

Comments
1 min read
Build vs. Buy: How to approach SSO for your SaaS app

Build vs. Buy: How to approach SSO for your SaaS app

1
Comments
4 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

2
Comments
7 min read
Effective Strategies for MySQL User Management

Effective Strategies for MySQL User Management

Comments
1 min read
WebCheck: Find out what hackers know about your site

WebCheck: Find out what hackers know about your site

1
Comments
1 min read
OAuth em aplicações SPA / Mobile (PKCE extension)

OAuth em aplicações SPA / Mobile (PKCE extension)

1
Comments
4 min read
Unlocking the Power of Encryption: Safeguard Your Digital World Today

Unlocking the Power of Encryption: Safeguard Your Digital World Today

Comments 1
2 min read
New Securi-Taco Tuesdays Livestream (Monthly)

New Securi-Taco Tuesdays Livestream (Monthly)

2
Comments
2 min read
Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

Unlocking the Full Potential of GitGuardian: Empowering Developers In Code Security

1
Comments 1
7 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Comments
2 min read
JavaScript app security audit

JavaScript app security audit

Comments
2 min read
Security news weekly round-up - 5th July 2024

Security news weekly round-up - 5th July 2024

Comments
3 min read
Securing the Cloud #32

Securing the Cloud #32

Comments
5 min read
Secure Access to Connected Devices

Secure Access to Connected Devices

Comments
2 min read
Battle of the Shields: Unveiling the Best Two-Factor Authentication Method!

Battle of the Shields: Unveiling the Best Two-Factor Authentication Method!

Comments
2 min read
Issue 52 of AWS Cloud Security Weekly

Issue 52 of AWS Cloud Security Weekly

3
Comments
1 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
How to Protect Your Application from AI Bots

How to Protect Your Application from AI Bots

3
Comments
10 min read
𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

𝐂𝐫𝐞𝐚𝐭𝐢𝐧𝐠 𝐚 𝐜𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐫𝐚𝐭𝐞𝐠𝐲 𝐟𝐨𝐫 𝐲𝐨𝐮𝐫 𝐛𝐮𝐬𝐢𝐧𝐞𝐬𝐬: 𝐤𝐞𝐲 𝐬𝐭𝐚𝐠𝐞𝐬 𝐚𝐧𝐝 𝐫𝐞𝐜𝐨𝐦𝐦𝐞𝐧𝐝𝐚𝐭𝐢𝐨𝐧𝐬 🔒

1
Comments
1 min read
How to easily fix OpenSSH RegreSSHion vulnerability

How to easily fix OpenSSH RegreSSHion vulnerability

Comments
2 min read
Gone in 120 seconds

Gone in 120 seconds

Comments
5 min read
Enhancing Data Security with AES Encryption in Java 🚀🔒

Enhancing Data Security with AES Encryption in Java 🚀🔒

Comments
2 min read
Quarterly Rewards for security researchers!

Quarterly Rewards for security researchers!

1
Comments
1 min read
Challenge with RBAC Authentication

Challenge with RBAC Authentication

2
Comments
2 min read
Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

Big Brother or Big Benefits? The Impact of Face Recognition on Our Lives

3
Comments
1 min read
Top Search Engines for Pentesters

Top Search Engines for Pentesters

Comments
1 min read
Level up your Git security: Verified commits with Kleopatra!

Level up your Git security: Verified commits with Kleopatra!

1
Comments
1 min read
Unveiling the Truth: Debunking Myths and Misconceptions about 2FA

Unveiling the Truth: Debunking Myths and Misconceptions about 2FA

1
Comments
2 min read
When has rolling your own auth gone wrong?

When has rolling your own auth gone wrong?

Comments 1
2 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

2
Comments
2 min read
Unveiling the Shield: Ensuring Security with Open Source 2FA

Unveiling the Shield: Ensuring Security with Open Source 2FA

Comments
2 min read
Don't Be a Victim: The Ultimate Guide to Defending Against Cybersecurity Threats

Don't Be a Victim: The Ultimate Guide to Defending Against Cybersecurity Threats

Comments
2 min read
Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
🛡️ Key cybersecurity threats in 2024: What should businesses know?

🛡️ Key cybersecurity threats in 2024: What should businesses know?

2
Comments
1 min read
DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

DestroyLoneliness: npm starjacking attack on Roblox Node.js library delivers QuasarRAT

10
Comments
1 min read
6 Tools To Collect Anonymous Team Feedback

6 Tools To Collect Anonymous Team Feedback

Comments
2 min read
Protect Your Digital World: Why You Need 2FA Now More Than Ever

Protect Your Digital World: Why You Need 2FA Now More Than Ever

Comments
2 min read
Leveraging Environment Variables in Next.js for Secure Data Access

Leveraging Environment Variables in Next.js for Secure Data Access

1
Comments
2 min read
What's the Difference Between Session-Based Authentication and JWTs?

What's the Difference Between Session-Based Authentication and JWTs?

2
Comments
3 min read
Resourcely founder-led in person or virtual hands-on workshop

Resourcely founder-led in person or virtual hands-on workshop

Comments
1 min read
How to Deploy Infisical to Manage Application Secrets on Koyeb

How to Deploy Infisical to Manage Application Secrets on Koyeb

Comments
11 min read
Need Help with Nodemailer Access Issues on Outlook and Gmail

Need Help with Nodemailer Access Issues on Outlook and Gmail

Comments
1 min read
VerifyVault Beta v0.2.2 Released - Alternative to Authy

VerifyVault Beta v0.2.2 Released - Alternative to Authy

Comments
1 min read
loading...