DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Simple SIEM Home Lab Using Elastic Cloud

Simple SIEM Home Lab Using Elastic Cloud

7
Comments
4 min read
Essential Android Security Settings to Protect Your Personal Information

Essential Android Security Settings to Protect Your Personal Information

Comments
8 min read
Multi-Factor Authentication (MFA) on AWS: A Critical Security Measure

Multi-Factor Authentication (MFA) on AWS: A Critical Security Measure

4
Comments
2 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
Python for OSINT: Stalking the Internet Like a Pro

Python for OSINT: Stalking the Internet Like a Pro

5
Comments
2 min read
Security news weekly round-up - 14th March 2025

Security news weekly round-up - 14th March 2025

1
Comments
2 min read
5 Tricks to Secure your Docker Images

5 Tricks to Secure your Docker Images

19
Comments
3 min read
CORS Done Wrong? Say Hello to Security Risks!

CORS Done Wrong? Say Hello to Security Risks!

3
Comments 4
3 min read
Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros

Segurança em Aplicativos Móveis: Da Teoria à Prática em Sistemas Financeiros

Comments
7 min read
Mobile Application Security: From Theory to Practice in Financial Systems

Mobile Application Security: From Theory to Practice in Financial Systems

1
Comments
6 min read
Understanding Antimalware Service Executable: Is It Safe to Disable?

Understanding Antimalware Service Executable: Is It Safe to Disable?

2
Comments 1
3 min read
Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Research Paper Series: Zanzibar: Google’s Consistent, Global Authorization System

Comments
9 min read
Secure Your RESTful API Using Keycloak Role-Based Access Control

Secure Your RESTful API Using Keycloak Role-Based Access Control

13
Comments 2
8 min read
What is Port 22? SSH, Security Risks, & Best Practices

What is Port 22? SSH, Security Risks, & Best Practices

Comments
5 min read
How to Create Secure and Scalable Web Applications with MERN

How to Create Secure and Scalable Web Applications with MERN

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.