DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security, Privacy, and Trust in Web3 Systems

Security, Privacy, and Trust in Web3 Systems

1
Comments 1
4 min read
Seguridad y Compliance en Shopify: Protegiendo tu Tienda y Datos de Clientes

Seguridad y Compliance en Shopify: Protegiendo tu Tienda y Datos de Clientes

Comments
2 min read
BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

Comments
7 min read
Balancing Cloud Migration with Strong Cybersecurity – What’s Your Approach?

Balancing Cloud Migration with Strong Cybersecurity – What’s Your Approach?

Comments
1 min read
What is Security Patching and Why is it Essential for Businesses?

What is Security Patching and Why is it Essential for Businesses?

Comments
3 min read
Building Cryptography: Lego Bricks of Modern Security

Building Cryptography: Lego Bricks of Modern Security

1
Comments
9 min read
Why Magento 2 Security Patches Are Not Optional for Enterprise Stores

Why Magento 2 Security Patches Are Not Optional for Enterprise Stores

Comments
5 min read
Access Control in Web Apps: Backend + Frontend

Access Control in Web Apps: Backend + Frontend

Comments
5 min read
OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

OWASP AppSec Days France 2025: Learning To Defend The Global Supply Chain Together

1
Comments
7 min read
7 Tips for Securing Nginx with TLS, Firewall Rules, and Fail2Ban

7 Tips for Securing Nginx with TLS, Firewall Rules, and Fail2Ban

1
Comments
3 min read
Lessons from SocialBox: Modern Defenses Against Brute Force

Lessons from SocialBox: Modern Defenses Against Brute Force

Comments
4 min read
Ethical Data Practices Every Developer Should Care About in 2025

Ethical Data Practices Every Developer Should Care About in 2025

2
Comments 1
3 min read
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

4
Comments
4 min read
Deploy Vaultwarden on Nanocl

Deploy Vaultwarden on Nanocl

10
Comments
5 min read
Docker in a Nutshell: Security

Docker in a Nutshell: Security

Comments
3 min read
CMK: The Master Key to Your AWS Encryption Kingdom

CMK: The Master Key to Your AWS Encryption Kingdom

1
Comments
4 min read
SQL Server Ledger Tables: Complete Guide with Banking Example

SQL Server Ledger Tables: Complete Guide with Banking Example

Comments
3 min read
Outil de Cybersécurité du Jour - Sep 21, 2025

Outil de Cybersécurité du Jour - Sep 21, 2025

1
Comments
3 min read
Top Dependency Scanners: A Comprehensive Guide

Top Dependency Scanners: A Comprehensive Guide

Comments
6 min read
SSH Key Authentication in Linux

SSH Key Authentication in Linux

2
Comments
4 min read
30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

2
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 16, 2025

Outil de Cybersécurité du Jour - Sep 16, 2025

Comments
3 min read
TemplateScorer

TemplateScorer

Comments
3 min read
JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

Comments
4 min read
Security news weekly round-up - 19th September 2025

Security news weekly round-up - 19th September 2025

1
Comments
3 min read
loading...