DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Modern Techniques to Prevent Unauthorized Access to Enterprise Systems

Comments
6 min read
The Evolution of Authentication : From Passwords to Passkeys

The Evolution of Authentication : From Passwords to Passkeys

6
Comments 1
8 min read
Complete Guide to AWS VPC Endpoints and PrivateLink: Making AWS Services Private! 🚀

Complete Guide to AWS VPC Endpoints and PrivateLink: Making AWS Services Private! 🚀

Comments
2 min read
Eavesdropping Drones

Eavesdropping Drones

Comments
1 min read
VPN (Bite-size Article)

VPN (Bite-size Article)

Comments 1
8 min read
Networking 101: Part 6

Networking 101: Part 6

6
Comments
16 min read
The Future of Login Systems: Biometric Authentication

The Future of Login Systems: Biometric Authentication

3
Comments
3 min read
Certificate Generation using OpenSSL locally

Certificate Generation using OpenSSL locally

Comments
2 min read
Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Sécuriser l'association entre un projet et son compte de facturation sur Google Cloud Platform

Comments
4 min read
API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

API7 Enterprise v3.4.0: Streamlined Certificate Management via SNI

7
Comments
3 min read
The Business Impact of Container Security: Beyond the Basics

The Business Impact of Container Security: Beyond the Basics

Comments
3 min read
How to truncate CBC ciphertext

How to truncate CBC ciphertext

Comments
8 min read
How to pass the OWASP MASVS verification by design

How to pass the OWASP MASVS verification by design

3
Comments
6 min read
Authentication Flow and symmetric keys

Authentication Flow and symmetric keys

4
Comments
2 min read
Detecting Homoglyph Attacks with Toolzr’s Character Identifier

Detecting Homoglyph Attacks with Toolzr’s Character Identifier

5
Comments
2 min read
DeepSeek iOS App poses major security risks

DeepSeek iOS App poses major security risks

2
Comments
1 min read
Cyber skill chain

Cyber skill chain

1
Comments
5 min read
How to protect your .NET Web API against Common Security Threats

How to protect your .NET Web API against Common Security Threats

7
Comments
13 min read
Quality software = Secure software

Quality software = Secure software

Comments
3 min read
Getting Started With Cerbos

Getting Started With Cerbos

Comments
7 min read
SQL Injection - In Just 5 Minutes!

SQL Injection - In Just 5 Minutes!

Comments
3 min read
Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Want to make your file Immutable? Lock it down with (chattr +i) and keep your files untouchable! 🔒💻

Comments
1 min read
Email Verification with Sent Codes in Ruby on Rails without Devise

Email Verification with Sent Codes in Ruby on Rails without Devise

15
Comments 2
5 min read
How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

How Private Internet Access (PIA) VPN Enhances Online Privacy, Security, and Performance

Comments
7 min read
Daily Quantum Learning #8 - Quantum Annealing

Daily Quantum Learning #8 - Quantum Annealing

3
Comments
2 min read
loading...