DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
New Features for Better State Control in WebForms Core 2

New Features for Better State Control in WebForms Core 2

Comments
5 min read
OpenGuardrails: Production-Grade AI Security for LLMs and Agentic Frameworks

OpenGuardrails: Production-Grade AI Security for LLMs and Agentic Frameworks

3
Comments
14 min read
# 🛡️ Introduction to Security in the Cloud: Why It Matters & How AWS IAM Protects Your World

# 🛡️ Introduction to Security in the Cloud: Why It Matters & How AWS IAM Protects Your World

4
Comments
7 min read
Configuring Azure App Service Authentication with Azure Entra ID to Exclude API Routes While Protecting the UI

Configuring Azure App Service Authentication with Azure Entra ID to Exclude API Routes While Protecting the UI

Comments
5 min read
Tines - SOAR Tool

Tines - SOAR Tool

Comments
1 min read
The Identity Shift: Why IAM is Becoming the Heart of Enterprise Security

The Identity Shift: Why IAM is Becoming the Heart of Enterprise Security

Comments
2 min read
Keycloak tm 2

Keycloak tm 2

Comments
9 min read
Use AI to Speed Up Security Hardening (and Read This First)

Use AI to Speed Up Security Hardening (and Read This First)

Comments
1 min read
Servicios de AWS que un Cloud Security Engineer debe dominar, aunque NO sean "servicios de seguridad" per se

Servicios de AWS que un Cloud Security Engineer debe dominar, aunque NO sean "servicios de seguridad" per se

Comments
3 min read
Implementing Multitenancy in Auth0 Using Organizations: A Complete Guide

Implementing Multitenancy in Auth0 Using Organizations: A Complete Guide

Comments
6 min read
Announcing udwall: A New Tool for Making UFW and Docker Play Nice With Each Other

Announcing udwall: A New Tool for Making UFW and Docker Play Nice With Each Other

17
Comments
5 min read
How SHA1 Generators Work (and Why You Should Follow Modern Hashing Best Practices)

How SHA1 Generators Work (and Why You Should Follow Modern Hashing Best Practices)

Comments
3 min read
Πώς το Web Application Firewall Συνεργάζεται με το Azure Front Door για Απόλυτη Προστασία Εφαρμογών

Πώς το Web Application Firewall Συνεργάζεται με το Azure Front Door για Απόλυτη Προστασία Εφαρμογών

Comments
1 min read
Trinity Protocol™: How We Built a 2-of-3 Multi-Chain Consensus System with 90% Gas Savings

Trinity Protocol™: How We Built a 2-of-3 Multi-Chain Consensus System with 90% Gas Savings

Comments
9 min read
Handling custom web security rules, how do you do it?

Handling custom web security rules, how do you do it?

Comments
4 min read
Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Hunting Hidden GraphQL Mutations How I Found AddWorkspaceWhitelistDomains Using JavaScript Analysis

Comments
1 min read
🔥 Understanding HTTP Deeply — The Backbone of the Web (For Backend Learners)

🔥 Understanding HTTP Deeply — The Backbone of the Web (For Backend Learners)

2
Comments
7 min read
Rate-based vs. Window-based Throttling

Rate-based vs. Window-based Throttling

1
Comments
5 min read
Pin It or Bin It

Pin It or Bin It

Comments
3 min read
Cloud App Journey: Ep. 5 — Cloud Security: Protecting APIs, Credentials, and Data on Azure

Cloud App Journey: Ep. 5 — Cloud Security: Protecting APIs, Credentials, and Data on Azure

Comments
3 min read
Day 4 — Continuous Monitoring (Midnight Vigil)

Day 4 — Continuous Monitoring (Midnight Vigil)

8
Comments
1 min read
Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats

Security in 2026 Starts Now: Preparing for the Next Wave of Digital Threats

Comments
3 min read
📚 An In-Depth Guide to Modern Cryptography and Web Security

📚 An In-Depth Guide to Modern Cryptography and Web Security

Comments
5 min read
The Oracle Problem Evolved: Why Privacy-Preserving Oracles Are the Missing Link for DeFi

The Oracle Problem Evolved: Why Privacy-Preserving Oracles Are the Missing Link for DeFi

3
Comments 3
3 min read
AI vs. AI: How Google's 'PROMPTFLUX' Malware Rewrites Itself (And How 'Big Sleep' Fights Back)

AI vs. AI: How Google's 'PROMPTFLUX' Malware Rewrites Itself (And How 'Big Sleep' Fights Back)

Comments
2 min read
loading...