DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

1
Comments
2 min read
Enable Aurora logs for security audits

Enable Aurora logs for security audits

3
Comments
4 min read
From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

Comments 3
3 min read
How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

Comments
6 min read
Understanding Bcrypt's Work Factor and Choosing the Right Value

Understanding Bcrypt's Work Factor and Choosing the Right Value

5
Comments
5 min read
How to configure passwordless authentication using Ansible

How to configure passwordless authentication using Ansible

5
Comments
2 min read
PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

1
Comments
4 min read
GemCity TECH Mini-Conference

GemCity TECH Mini-Conference

6
Comments 1
4 min read
Security news weekly round-up - 4th April 2025

Security news weekly round-up - 4th April 2025

2
Comments
3 min read
Access Control and Zero-Knowledge

Access Control and Zero-Knowledge

Comments
4 min read
Understanding CVE-2025-29927 - The Next.js Vulnerability

Understanding CVE-2025-29927 - The Next.js Vulnerability

1
Comments
3 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

1
Comments
10 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
The Hack That Made People Rich.....in Subway Surfers

The Hack That Made People Rich.....in Subway Surfers

2
Comments 2
4 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

1
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

1
Comments
10 min read
How to Prevent SQL Injection

How to Prevent SQL Injection

1
Comments
2 min read
Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Comments
1 min read
AI Security: The Next Frontier in Infrastructure Protection

AI Security: The Next Frontier in Infrastructure Protection

Comments
4 min read
Zero Trust Vs Principle of Least Privilege (PoLP)

Zero Trust Vs Principle of Least Privilege (PoLP)

Comments
5 min read
loading...