DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to protect your website and hosting from cyberattacks — recommendations and turn-key solutions for project security

How to protect your website and hosting from cyberattacks — recommendations and turn-key solutions for project security

9
Comments
8 min read
Understanding SSL and Its Importance

Understanding SSL and Its Importance

1
Comments 1
2 min read
AI Chatbots: Boon or Security Time Bomb?

AI Chatbots: Boon or Security Time Bomb?

Comments
2 min read
Enhancing SDLC with Security: A Guide to SSDL and CI/CD Pipelines

Enhancing SDLC with Security: A Guide to SSDL and CI/CD Pipelines

Comments
5 min read
SSO (Single Sign-On) and Identity Federation: A Cloud Engineer's Perspective

SSO (Single Sign-On) and Identity Federation: A Cloud Engineer's Perspective

1
Comments
5 min read
Why Are AI Tools Getting Free?

Why Are AI Tools Getting Free?

1
Comments
11 min read
Serverless self-service IoT certificate management - Part 2

Serverless self-service IoT certificate management - Part 2

2
Comments
8 min read
Password Composition Policies Are Bad and Here's Why

Password Composition Policies Are Bad and Here's Why

Comments
9 min read
How to Change Your Password Securely

How to Change Your Password Securely

Comments
3 min read
Understanding SSH: Secure Shell Protocol

Understanding SSH: Secure Shell Protocol

Comments
2 min read
Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 2

Enhancing Data Security with Spark: A Guide to Column-Level Encryption - Part 2

1
Comments
6 min read
Generating SECRET_KEY for production deployment of Django project

Generating SECRET_KEY for production deployment of Django project

Comments
1 min read
Cloud Networking 101: Understanding VPCs, Subnets, and Security Groups.

Cloud Networking 101: Understanding VPCs, Subnets, and Security Groups.

2
Comments
9 min read
Home for the Holidays: Staying Ahead of Cybersecurity Threats

Home for the Holidays: Staying Ahead of Cybersecurity Threats

Comments
4 min read
Docker Swarm vs Kubernetes - A Deep Technical Analysis

Docker Swarm vs Kubernetes - A Deep Technical Analysis

5
Comments
7 min read
Introducing Altikrity: A Multi-Layer Encryption Library

Introducing Altikrity: A Multi-Layer Encryption Library

Comments
2 min read
Code Smell 284 - Encrypted Functions

Code Smell 284 - Encrypted Functions

Comments
5 min read
Unit tests so you don't lose your levitating plant

Unit tests so you don't lose your levitating plant

Comments
3 min read
What is AWS Lightsail? - A DevOps Engineer's Perspective

What is AWS Lightsail? - A DevOps Engineer's Perspective

5
Comments
6 min read
Giới thiệu căn bản về thư viện JasperReports

Giới thiệu căn bản về thư viện JasperReports

Comments
7 min read
WRITE-UP ASCIS 2023

WRITE-UP ASCIS 2023

Comments
6 min read
What You Need to Know Before Creating Your Own Stablecoin

What You Need to Know Before Creating Your Own Stablecoin

2
Comments
4 min read
Code Quality in the Cloud

Code Quality in the Cloud

Comments
6 min read
Streamlining AWS Security Hub and Policy Management for Organizations with Terraform

Streamlining AWS Security Hub and Policy Management for Organizations with Terraform

1
Comments
5 min read
Microsoft 365 Data at Risk? Best Office 365 Backup Solutions for Enhanced Security

Microsoft 365 Data at Risk? Best Office 365 Backup Solutions for Enhanced Security

Comments
4 min read
How to get into your CMS when you've locked the keys in your car.

How to get into your CMS when you've locked the keys in your car.

1
Comments
2 min read
Security news weekly round-up - 20th December 2024

Security news weekly round-up - 20th December 2024

1
Comments
3 min read
OAuth2 and PKCE: Enhancing Security for Public Clients

OAuth2 and PKCE: Enhancing Security for Public Clients

Comments
3 min read
Zero Downtime migration of API Authentication

Zero Downtime migration of API Authentication

Comments
4 min read
Integrating Clerk With Zuplo For Seamless API Authentication

Integrating Clerk With Zuplo For Seamless API Authentication

Comments
6 min read
Using PropelAuth to secure your API at the Gateway

Using PropelAuth to secure your API at the Gateway

Comments
3 min read
Day 1 - Introducing the ZAPI Management API

Day 1 - Introducing the ZAPI Management API

Comments
3 min read
Adding Developer Portal Access and Request Validation to a Firestore API

Adding Developer Portal Access and Request Validation to a Firestore API

Comments
7 min read
Adding API Key Authentication to a Firestore API

Adding API Key Authentication to a Firestore API

Comments
12 min read
User-level auth in your Supabase API - Supaweek Day 2

User-level auth in your Supabase API - Supaweek Day 2

Comments
4 min read
Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Comments
4 min read
Why Zuplo Has the Best Damn Rate Limiter on the Planet

Why Zuplo Has the Best Damn Rate Limiter on the Planet

Comments
2 min read
Rebuttal: API keys can do everything

Rebuttal: API keys can do everything

Comments
7 min read
Day 5 - Announcing v2 of react-api-key-manager

Day 5 - Announcing v2 of react-api-key-manager

Comments
1 min read
Tips and Best Practices for API Authentication

Tips and Best Practices for API Authentication

Comments
10 min read
Simple HTTP Authentication: A Beginner’s Guide

Simple HTTP Authentication: A Beginner’s Guide

Comments
9 min read
Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Comments
7 min read
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
Enforcing guardrails in the AWS environment

Enforcing guardrails in the AWS environment

1
Comments
7 min read
Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Comments
9 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
Kubernetes Security Best Practices: Safeguarding Your Cluster and Workloads

Kubernetes Security Best Practices: Safeguarding Your Cluster and Workloads

Comments
3 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Comments
4 min read
OS Security & Encryption: Protect Your Data Like a Pro! 🔐

OS Security & Encryption: Protect Your Data Like a Pro! 🔐

Comments
2 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
Managing and Securing Access to AWS Resources Using IAM

Managing and Securing Access to AWS Resources Using IAM

Comments
6 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
BSides Austin 2024: Balancing AI Safety and Real-World Risks

BSides Austin 2024: Balancing AI Safety and Real-World Risks

7
Comments 1
6 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
loading...