DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

1
Comments
2 min read
Understanding AWS Cognito: A Complete Guide to User Authentication and Management

Understanding AWS Cognito: A Complete Guide to User Authentication and Management

3
Comments 1
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

4
Comments
2 min read
Password Hashing and Data Integrity in Real-World Implementation

Password Hashing and Data Integrity in Real-World Implementation

20
Comments 1
2 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
JavaScript Security Best Practices: Prevent Vulnerabilities | Mbloging

JavaScript Security Best Practices: Prevent Vulnerabilities | Mbloging

Comments
2 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

Comments
3 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

1
Comments
1 min read
Account Email and Password Change using .NET Identity

Account Email and Password Change using .NET Identity

1
Comments
6 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

12
Comments
4 min read
Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

1
Comments 1
4 min read
Generate your Let's Encrypt Digital Certificates for all your domains using Apache

Generate your Let's Encrypt Digital Certificates for all your domains using Apache

Comments
3 min read
Announcing RODiT API: Revolutionizing API Authentication

Announcing RODiT API: Revolutionizing API Authentication

Comments
1 min read
IP Whitelisting, the silent killer

IP Whitelisting, the silent killer

Comments
2 min read
Configure SSH Login from Windows to Windows

Configure SSH Login from Windows to Windows

9
Comments
3 min read
Authorization using .NET Identity

Authorization using .NET Identity

5
Comments
6 min read
loading...