DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How JWT, JWS, and JWE Secure Your Data?

How JWT, JWS, and JWE Secure Your Data?

Comments
4 min read
Networking 101: Part 6

Networking 101: Part 6

5
Comments
16 min read
Running Ollama in a Container Without Internet Access

Running Ollama in a Container Without Internet Access

Comments
3 min read
API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

6
Comments
3 min read
Telegram Boosts User Experience with Improved Technology

Telegram Boosts User Experience with Improved Technology

Comments
1 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

Comments
6 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

1
Comments
2 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase

How note.com 🔖 Implements ⏳ Just-in-Time (JIT) Database Access Control 🗝️ with Bytebase

6
Comments
4 min read
Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Implementing Zero Trust Architecture in Web Development: Enhancing Security for Modern Applications

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Comments
1 min read
JWT in Action: Secure Authentication & Authorization in Go

JWT in Action: Secure Authentication & Authorization in Go

5
Comments
9 min read
The $500K Tool That Got Me a Cease-and-Desist from 𝕏

The $500K Tool That Got Me a Cease-and-Desist from 𝕏

Comments
4 min read
Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Daily Quantum Learning #8 - Quantum Annealing

Daily Quantum Learning #8 - Quantum Annealing

Comments
2 min read
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

4
Comments
2 min read
Data Privacy in the API Economy: Balancing Innovation with Security

Data Privacy in the API Economy: Balancing Innovation with Security

16
Comments 1
6 min read
CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

CORS Policy Explained: Why Cross-Origin Errors Happen and How to Fix Them

Comments
2 min read
How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

How Zero-Knowledge Proofs (ZKPs) Are Changing Blockchain Privacy

Comments
2 min read
𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

𝗧𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻: 𝗦𝗶𝗺𝗽𝗹𝗶𝗳𝘆𝗶𝗻𝗴 𝗦𝗲𝗰𝘂𝗿𝗲 𝗔𝗣𝗜 𝗖𝗼𝗺𝗺𝘂𝗻𝗶𝗰𝗮𝘁𝗶𝗼𝗻 🚀

Comments
1 min read
FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

FingerTyping.com: A Free, Open-Source, Secure Typing Application Built with Next.js, Tailwind CSS, and TypeScript

Comments
2 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
3 min read
Importance of Timely Security Patching in Software Maintenance

Importance of Timely Security Patching in Software Maintenance

Comments
2 min read
Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Mastering Prompt Engineering for Multi-Agent AI Workflows in KaibanJS

Comments
3 min read
CI/CD

CI/CD

Comments
2 min read
loading...