DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
Securing Your Next.js Application: The Basic Defenders (Security Headers)

Securing Your Next.js Application: The Basic Defenders (Security Headers)

6
Comments
8 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Benefits of Separating the Database and Other Services from the Web Application

Benefits of Separating the Database and Other Services from the Web Application

1
Comments 1
2 min read
Implementing Multi-Factor Authentication (MFA) in .NET Applications

Implementing Multi-Factor Authentication (MFA) in .NET Applications

10
Comments
2 min read
Security in Programming: Best Practices to Keep Your Code and Systems Safe

Security in Programming: Best Practices to Keep Your Code and Systems Safe

6
Comments 2
3 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
Managing and Securing Access to AWS Resources Using IAM

Managing and Securing Access to AWS Resources Using IAM

Comments
6 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
Memecoins: fun or fad? Why anonymity isn’t always a plus for investors

Memecoins: fun or fad? Why anonymity isn’t always a plus for investors

7
Comments
2 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
How to Pass the CISSP Exam on Your 1st Attempt in 2025?

How to Pass the CISSP Exam on Your 1st Attempt in 2025?

3
Comments 1
5 min read
Stop Ignoring This Key Angular Tool-Your App’s Security Depends on It

Stop Ignoring This Key Angular Tool-Your App’s Security Depends on It

2
Comments 2
3 min read
Why Security Testing is a Must-Have for Fintech Success

Why Security Testing is a Must-Have for Fintech Success

Comments
4 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Encrypting EBS Volumes of Amazon EC2 Instances Using Python

Encrypting EBS Volumes of Amazon EC2 Instances Using Python

2
Comments
8 min read
Configure EKS Cluster Security - Pod Security, Network Policies, Pod Identity

Configure EKS Cluster Security - Pod Security, Network Policies, Pod Identity

4
Comments
12 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
Building a Home Lab for Cybersecurity Practice: A Step-by-Step Guide

Building a Home Lab for Cybersecurity Practice: A Step-by-Step Guide

5
Comments
3 min read
loading...