DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why GRC Should Matter to Every Developer, Not Just Compliance Teams

Why GRC Should Matter to Every Developer, Not Just Compliance Teams

Comments
2 min read
OAuth2 Explained Simply — For Developers Who Hate Overcomplicated Docs

OAuth2 Explained Simply — For Developers Who Hate Overcomplicated Docs

Comments
6 min read
The "S" in MCP Stands for Security

The "S" in MCP Stands for Security

Comments
3 min read
X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

1
Comments
2 min read
Understanding Linux

Understanding Linux

2
Comments 5
4 min read
Understanding Bcrypt's Work Factor and Choosing the Right Value

Understanding Bcrypt's Work Factor and Choosing the Right Value

Comments
5 min read
🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

Comments
12 min read
PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

Comments
4 min read
🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

1
Comments
1 min read
Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Comments
2 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
Edge Computing: The Future of Cloud & DevOps

Edge Computing: The Future of Cloud & DevOps

7
Comments
3 min read
Salesforce Security Best Practices: How to Protect Your CRM Data

Salesforce Security Best Practices: How to Protect Your CRM Data

Comments
1 min read
Security news weekly round-up - 4th April 2025

Security news weekly round-up - 4th April 2025

1
Comments
3 min read
The Pervasive Impact of Ransomware on Cybersecurity.

The Pervasive Impact of Ransomware on Cybersecurity.

Comments
19 min read
Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Comments
7 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments
2 min read
How to configure passwordless authentication using Ansible

How to configure passwordless authentication using Ansible

6
Comments
2 min read
Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Comments
1 min read
Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

Comments
10 min read
An Introduction to API Security Automation

An Introduction to API Security Automation

Comments
10 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
ICP Vetkey Quickstart Guide

ICP Vetkey Quickstart Guide

Comments
10 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

Comments
2 min read
loading...