DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Congrats to the Permit.io Authorization Challenge Winners!

Congrats to the Permit.io Authorization Challenge Winners!

42
Comments 20
2 min read
Rate Limiting in Node.js Using Redis and Token Bucket Algorithm

Rate Limiting in Node.js Using Redis and Token Bucket Algorithm

1
Comments
3 min read
Multi-Tenant 👥 Database Architecture Patterns Explained💬

Multi-Tenant 👥 Database Architecture Patterns Explained💬

6
Comments
4 min read
Vibe Check: Securing AI-Generated Code Using MCP

Vibe Check: Securing AI-Generated Code Using MCP

6
Comments
4 min read
Getting Authentication Right is Critical to Running MCP Servers

Getting Authentication Right is Critical to Running MCP Servers

9
Comments
6 min read
Announcing Tigris’ SOC2 Type II Certification

Announcing Tigris’ SOC2 Type II Certification

Comments
2 min read
Mindgard - Automated AI Red Teaming & Security Testing

Mindgard - Automated AI Red Teaming & Security Testing

Comments
1 min read
How To: Update AWS SRA in your Control Tower environment

How To: Update AWS SRA in your Control Tower environment

2
Comments
4 min read
Ethical Hacking vs Black Hat Hacking – What’s the Difference?

Ethical Hacking vs Black Hat Hacking – What’s the Difference?

Comments
3 min read
AWS IAM for Beginners: Understanding User Groups

AWS IAM for Beginners: Understanding User Groups

2
Comments
2 min read
How a job interview led me to create Obscura - A password generator with real entropy

How a job interview led me to create Obscura - A password generator with real entropy

Comments
5 min read
Securing Kubernetes API Server Health Checks Without Anonymous Access

Securing Kubernetes API Server Health Checks Without Anonymous Access

1
Comments
3 min read
From Pizza Orders to Party Crashers: Understanding Web Security Threats

From Pizza Orders to Party Crashers: Understanding Web Security Threats

Comments
2 min read
The Importance of Security Measures for WordPress Websites and How WP Cerber Can Help

The Importance of Security Measures for WordPress Websites and How WP Cerber Can Help

Comments
4 min read
Implementing AWS SSO Integration with Jenkins

Implementing AWS SSO Integration with Jenkins

15
Comments
4 min read
Strengthening Enterprise Security: Key Strategies and Best Practices

Strengthening Enterprise Security: Key Strategies and Best Practices

Comments
2 min read
Steps to Conduct a Network Security Audit

Steps to Conduct a Network Security Audit

Comments
3 min read
Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Comments
1 min read
Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Comments
35 min read
Leveraging AWS WAF to Defend an Insecure Web App

Leveraging AWS WAF to Defend an Insecure Web App

1
Comments
4 min read
The Ultimate Guide to Two-Factor Authentication (2FA) on WordPress

The Ultimate Guide to Two-Factor Authentication (2FA) on WordPress

Comments
3 min read
🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

4
Comments
1 min read
Reverse Proxy vs. API Gateway vs. Load Balancer🌐

Reverse Proxy vs. API Gateway vs. Load Balancer🌐

5
Comments
2 min read
🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

5
Comments
1 min read
Securing React Applications with ReCAPTZ: A Complete Guide

Securing React Applications with ReCAPTZ: A Complete Guide

Comments
3 min read
loading...