DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

Comments
6 min read
API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

5
Comments
3 min read
Telegram Boosts User Experience with Improved Technology

Telegram Boosts User Experience with Improved Technology

Comments
1 min read
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

3
Comments
2 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

1
Comments
2 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

Comments
1 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase

How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase

6
Comments
4 min read
Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Comments
1 min read
JWT in Action: Secure Authentication & Authorization in Go

JWT in Action: Secure Authentication & Authorization in Go

5
Comments
9 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Daily Quantum Learning #8 - Quantum Annealing

Daily Quantum Learning #8 - Quantum Annealing

Comments
2 min read
Data Privacy in the API Economy: Balancing Innovation with Security

Data Privacy in the API Economy: Balancing Innovation with Security

16
Comments 1
6 min read
CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

Comments
2 min read
How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

Comments
2 min read
𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

Comments
1 min read
FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

Comments
2 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
3 min read
Importance of Timely Security Patching in Software Maintenance

Importance of Timely Security Patching in Software Maintenance

Comments
2 min read
Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Comments
3 min read
CI/CD

CI/CD

Comments
2 min read
How to Run Models Locally: A Step-by-Step Guide for Non-Techies

How to Run Models Locally: A Step-by-Step Guide for Non-Techies

Comments
3 min read
New cyber security Crawler

New cyber security Crawler

Comments
2 min read
loading...