DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding AWS Cognito: A Complete Guide to User Authentication and Management

Understanding AWS Cognito: A Complete Guide to User Authentication and Management

2
Comments 1
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

Comments
2 min read
Stop Using Go Templates for SQL (Until You Read This)

Stop Using Go Templates for SQL (Until You Read This)

Comments
2 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
Tutorial: How to protect your business from referral fraud

Tutorial: How to protect your business from referral fraud

Comments
11 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

Comments
1 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

1
Comments
3 min read
Account Email and Password Change using .NET Identity

Account Email and Password Change using .NET Identity

1
Comments
6 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
Hidden Vulnerabilities - DeepSeek / LLM's

Hidden Vulnerabilities - DeepSeek / LLM's

8
Comments 2
2 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 2
2 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
🔐 DeepSeek AI: Balance Power & Privacy 🤖

🔐 DeepSeek AI: Balance Power & Privacy 🤖

Comments
1 min read
Web Security with Content Security Policy (CSP) and JavaScript

Web Security with Content Security Policy (CSP) and JavaScript

Comments
4 min read
HttpOnly Cookies: A Secure Solution for Sensitive Data

HttpOnly Cookies: A Secure Solution for Sensitive Data

Comments
3 min read
Understanding Proxy Servers

Understanding Proxy Servers

1
Comments 1
4 min read
Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Comments
6 min read
CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

11
Comments
4 min read
Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

Comments 1
4 min read
loading...