DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

Comments 2
4 min read
How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow

How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow

Comments
4 min read
Build Your Unshakeable AWS Cloud Security Career: The Practical Roadmap Employers Crave

Build Your Unshakeable AWS Cloud Security Career: The Practical Roadmap Employers Crave

Comments
2 min read
Using AWS Detective Controls for Real-Time Security with Logs & Monitoring

Using AWS Detective Controls for Real-Time Security with Logs & Monitoring

Comments
3 min read
Serverless Security: Building Trust in the Cloud

Serverless Security: Building Trust in the Cloud

Comments
5 min read
Penetration Testing Firms: 10 Red Flags Every Business Should Know

Penetration Testing Firms: 10 Red Flags Every Business Should Know

1
Comments
22 min read
Zeroize: The Tiny and Memory-Safe Rust Crate

Zeroize: The Tiny and Memory-Safe Rust Crate

1
Comments
2 min read
Snowflake Architecture Series: A Foundational Checklist

Snowflake Architecture Series: A Foundational Checklist

Comments
11 min read
Your application should be PCI-DSS-compliant

Your application should be PCI-DSS-compliant

5
Comments
5 min read
Segurança com Zabbix

Segurança com Zabbix

Comments
2 min read
Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

3
Comments
4 min read
The Ruby OAuth Collective

The Ruby OAuth Collective

6
Comments 2
1 min read
Reference Architecture for Team AI Productivity

Reference Architecture for Team AI Productivity

5
Comments
9 min read
La cybersécurité et les mots de passe

La cybersécurité et les mots de passe

Comments
1 min read
How to Use NFC for Contactless Door Access (with Code Examples)

How to Use NFC for Contactless Door Access (with Code Examples)

Comments
4 min read
100DaysOfCode — Day 28

100DaysOfCode — Day 28

Comments
1 min read
Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

5
Comments
4 min read
How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

3
Comments
3 min read
Preventing the Qantas Cyberattack: What Could Have Been Done Differently?

Preventing the Qantas Cyberattack: What Could Have Been Done Differently?

1
Comments
5 min read
Sketching AI Security: Identity and Security Challenges in AI Development

Sketching AI Security: Identity and Security Challenges in AI Development

7
Comments 1
13 min read
วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

Comments 1
1 min read
SWIFT Sandbox Certificate failure during consuming SWIFT/ API from SWIFT/ SDK application

SWIFT Sandbox Certificate failure during consuming SWIFT/ API from SWIFT/ SDK application

Comments 1
1 min read
Introducing SecretLink: The Secure Way to Share Sensitive Information

Introducing SecretLink: The Secure Way to Share Sensitive Information

Comments
2 min read
Is innerHTML Dangerous? Myth vs Reality

Is innerHTML Dangerous? Myth vs Reality

3
Comments
2 min read
How to Implement Refresh Tokens and Token Revocation in ASP.NET Core

How to Implement Refresh Tokens and Token Revocation in ASP.NET Core

1
Comments 1
9 min read
loading...