DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Keyper by Jarrid: Introduce Secure Data Flow

Keyper by Jarrid: Introduce Secure Data Flow

1
Comments
3 min read
Meme Monday

Meme Monday

11
Comments 1
1 min read
Spring Security 102: From Setup to Secure Endpoints in Spring Boot

Spring Security 102: From Setup to Secure Endpoints in Spring Boot

Comments
3 min read
Security Best Practices

Security Best Practices

1
Comments
2 min read
How to build a secure voting web app with FACEIO

How to build a secure voting web app with FACEIO

21
Comments
13 min read
Designing a Secure Architecture for Distributed Systems

Designing a Secure Architecture for Distributed Systems

1
Comments 2
5 min read
Spring Security 101: Understanding the Basics

Spring Security 101: Understanding the Basics

5
Comments
3 min read
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Comments
8 min read
Proxmox Security Series:Securing Root Access

Proxmox Security Series:Securing Root Access

Comments
5 min read
Introduction to JWT and OAuth 2.0

Introduction to JWT and OAuth 2.0

3
Comments
4 min read
Agile2024: Making Sure Security Is Part Of Our Processes

Agile2024: Making Sure Security Is Part Of Our Processes

Comments
8 min read
Sumo Tatami x Serverspace

Sumo Tatami x Serverspace

Comments
2 min read
🛡️An Introduction to Secure Coding Practices🛡️

🛡️An Introduction to Secure Coding Practices🛡️

4
Comments
2 min read
Ethical Hacking : Users password cracking

Ethical Hacking : Users password cracking

4
Comments
17 min read
Security news weekly round-up - 23rd August 2024

Security news weekly round-up - 23rd August 2024

2
Comments
4 min read
Securing Microservices with Spring Security: Implementing JWT

Securing Microservices with Spring Security: Implementing JWT

7
Comments
14 min read
A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

4
Comments
7 min read
Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

Supabase Auth: Bring-your-own Auth0, Cognito, or Firebase

55
Comments
3 min read
Implementing Access Requests and Approvals in your App

Implementing Access Requests and Approvals in your App

19
Comments
4 min read
How do I keep my digital life safe? (And you should too)

How do I keep my digital life safe? (And you should too)

3
Comments 5
5 min read
🌐 Securing Kubernetes Secrets in AKS: Using Azure Key Vault with Managed and User Assigned Identities 🚀

🌐 Securing Kubernetes Secrets in AKS: Using Azure Key Vault with Managed and User Assigned Identities 🚀

3
Comments 2
7 min read
How SSL Certificates Work?

How SSL Certificates Work?

Comments
2 min read
How to Explore an Exposed .git

How to Explore an Exposed .git

6
Comments 1
4 min read
Ensuring GCE instances have full access to GCP APIs

Ensuring GCE instances have full access to GCP APIs

Comments
1 min read
How to Implement HashiCorp Vault SSH Secrets Engine for securing SSH access

How to Implement HashiCorp Vault SSH Secrets Engine for securing SSH access

Comments
4 min read
Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

Maximizing Software Security: The Benefits of Tracking SBOMs in Your Projects

7
Comments
4 min read
How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯

How to Create a Secure Newsletter Subscription with NextJS, Supabase, Nodemailer and Arcjet 🔐💯

39
Comments 4
21 min read
Sign in with Apple for Node.js

Sign in with Apple for Node.js

Comments
7 min read
Kaniko : Révolutionner vos builds Docker en toute sécurité

Kaniko : Révolutionner vos builds Docker en toute sécurité

1
Comments
5 min read
5 Best Video Hosting Platforms for 2024

5 Best Video Hosting Platforms for 2024

Comments
4 min read
🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰

🌐 MongoDB in the Financial Industry: Vector Search and ACID-Compliant Transactions 💰

6
Comments
3 min read
An autopsy on the CrowdStrike outage

An autopsy on the CrowdStrike outage

2
Comments 1
6 min read
Alien biohazard approach to security

Alien biohazard approach to security

Comments
2 min read
🔒 应用技巧: MongoDB安全、合规性与零信任 🔑

🔒 应用技巧: MongoDB安全、合规性与零信任 🔑

5
Comments
1 min read
Everything you need to know about Base64

Everything you need to know about Base64

25
Comments 1
5 min read
Is Amazon Q Developer Secure?

Is Amazon Q Developer Secure?

7
Comments
4 min read
How to Check TLS Configuration of URLs with Curl and Bash Script

How to Check TLS Configuration of URLs with Curl and Bash Script

2
Comments
4 min read
Achieving Sustainable Development Goals through Green Building Standards

Achieving Sustainable Development Goals through Green Building Standards

2
Comments
4 min read
Code Smell 262 - Not Replaced Constants

Code Smell 262 - Not Replaced Constants

1
Comments
2 min read
🚀 Kubernetes RBAC and Role Aggregation Made Easy

🚀 Kubernetes RBAC and Role Aggregation Made Easy

Comments
4 min read
Up(sun) and running with Rust: The game-changer in systems programming

Up(sun) and running with Rust: The game-changer in systems programming

Comments
1 min read
Git: Keeping your email safe in public repositories

Git: Keeping your email safe in public repositories

1
Comments 4
2 min read
How Laravel's TrimStrings Middleware Can Cause Issues

How Laravel's TrimStrings Middleware Can Cause Issues

2
Comments
2 min read
Exploring Common Deployment Models for Web Application Firewalls (WAF)

Exploring Common Deployment Models for Web Application Firewalls (WAF)

7
Comments
3 min read
GnuPG and Digital Signatures

GnuPG and Digital Signatures

Comments
4 min read
Proxmox Security Series: Strengthening Your Virtual Environment

Proxmox Security Series: Strengthening Your Virtual Environment

5
Comments 1
4 min read
Web App Vulnerabilities

Web App Vulnerabilities

Comments
2 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
Quick Facts On the AT&T Breach

Quick Facts On the AT&T Breach

Comments
1 min read
Securing Your DevOps: Lessons from a Close Call

Securing Your DevOps: Lessons from a Close Call

Comments
2 min read
HTB Academy: Password Attacks Module - Password Mutations Section

HTB Academy: Password Attacks Module - Password Mutations Section

Comments
2 min read
Deep Linking AWS Console with all your AWS IAM Identity Center Roles

Deep Linking AWS Console with all your AWS IAM Identity Center Roles

6
Comments 4
6 min read
Ditch Passwords: Add Facial Recognition to Your Website with FACEIO

Ditch Passwords: Add Facial Recognition to Your Website with FACEIO

11
Comments 2
4 min read
Bug bounty hunting with LLMs

Bug bounty hunting with LLMs

37
Comments 1
2 min read
Starting My DevOps Journey: A 3-Hour Course That Changed Everything

Starting My DevOps Journey: A 3-Hour Course That Changed Everything

Comments 2
2 min read
How to disable Spring Security for static resources

How to disable Spring Security for static resources

Comments
2 min read
Cryptography Concepts Simplified

Cryptography Concepts Simplified

Comments
2 min read
Security news weekly round-up - 16th August 2024

Security news weekly round-up - 16th August 2024

1
Comments
3 min read
Navigating the Security Risks of Arbitrary Values in Tailwind CSS

Navigating the Security Risks of Arbitrary Values in Tailwind CSS

10
Comments
3 min read
Trust but verify

Trust but verify

1
Comments
4 min read
loading...