DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Are Passwords A Thing Of The Past?

Are Passwords A Thing Of The Past?

4
Comments
2 min read
Establishing Trust: Why TLS should be important to you

Establishing Trust: Why TLS should be important to you

5
Comments
5 min read
3 Metrics Relevant to Every Service, Always

3 Metrics Relevant to Every Service, Always

5
Comments
5 min read
Securing a Webapp - Step 0: An Introduction

Securing a Webapp - Step 0: An Introduction

50
Comments 4
2 min read
Testing python security

Testing python security

8
Comments
1 min read
Security leader interview: Adam Surak on approaching security at Algolia

Security leader interview: Adam Surak on approaching security at Algolia

3
Comments
7 min read
The secret sauce of software licenses: it may be bitter.

The secret sauce of software licenses: it may be bitter.

4
Comments
4 min read
MPC Part 1: Oblivious Transfer

MPC Part 1: Oblivious Transfer

8
Comments 3
8 min read
Can a VPN be hacked?

Can a VPN be hacked?

3
Comments 1
1 min read
100% Anonymous VPN: Does it really exist?

100% Anonymous VPN: Does it really exist?

5
Comments
1 min read
Git, GitHub and how to keep your secrets... secret!

Git, GitHub and how to keep your secrets... secret!

6
Comments
1 min read
Clients and Servers

Clients and Servers

5
Comments 1
2 min read
feedback for speedle open source project

feedback for speedle open source project

10
Comments 1
1 min read
Passphrases and Key Files

Passphrases and Key Files

7
Comments 1
1 min read
GitHub - realtho/PartyLoud

GitHub - realtho/PartyLoud

4
Comments 3
1 min read
Facebook direct links for Firefox is back!

Facebook direct links for Firefox is back!

4
Comments 1
1 min read
Unsafe SQL functions in Laravel

Unsafe SQL functions in Laravel

7
Comments 1
1 min read
How To Make Your Mobile App Trustworthy: Six Aspects To Consider

How To Make Your Mobile App Trustworthy: Six Aspects To Consider

7
Comments 3
5 min read
Make people trust your NuGet Packages more with code signing!

Make people trust your NuGet Packages more with code signing!

9
Comments
8 min read
Lessons learned from jerks on the Internet

Lessons learned from jerks on the Internet

6
Comments 1
1 min read
Configure Azure AD Privileged Identity Management

Configure Azure AD Privileged Identity Management

5
Comments
2 min read
Implement Secure data solutions

Implement Secure data solutions

5
Comments
2 min read
Attacking phone through BT headset

Attacking phone through BT headset

10
Comments 3
1 min read
California's new privacy law explained

California's new privacy law explained

5
Comments
1 min read
Does it matter how the cryptographic keys stored?

Does it matter how the cryptographic keys stored?

5
Comments 1
1 min read
Building for the bad guys

Building for the bad guys

8
Comments
3 min read
Today’s rails security update in plain english

Today’s rails security update in plain english

34
Comments 6
2 min read
Why did we build ApproveAPI?

Why did we build ApproveAPI?

7
Comments
2 min read
Great Scott! Timing Attack Demo for the Everyday Webdev

Great Scott! Timing Attack Demo for the Everyday Webdev

7
Comments
10 min read
The Real Facts About VPNs

The Real Facts About VPNs

11
Comments 3
2 min read
Customer Security Questionnaires: The VRA Two-Step

Customer Security Questionnaires: The VRA Two-Step

3
Comments
10 min read
Is it safe to host many droplets in one digital ocean account?

Is it safe to host many droplets in one digital ocean account?

5
Comments 2
1 min read
Scraping Slack Webhooks from GitHub

Scraping Slack Webhooks from GitHub

12
Comments
6 min read
10 best practices to protect your users’ data (and why they’re still not sufficient)

10 best practices to protect your users’ data (and why they’re still not sufficient)

57
Comments 7
5 min read
Basic Security Hygiene

Basic Security Hygiene

10
Comments
7 min read
How to secure and manage secrets using Google Cloud KMS

How to secure and manage secrets using Google Cloud KMS

5
Comments
1 min read
Question about topic

Question about topic

7
Comments 7
1 min read
RAD Studio 10.3 Rio Support in Updated SecureBridge by Devart

RAD Studio 10.3 Rio Support in Updated SecureBridge by Devart

3
Comments
1 min read
Botnet in good approach

Botnet in good approach

5
Comments
1 min read
What is SQL injection?

What is SQL injection?

12
Comments 5
2 min read
Checking your project dependencies for vulnerabilites

Checking your project dependencies for vulnerabilites

31
Comments 1
1 min read
Apache Knox - Performance Improvements

Apache Knox - Performance Improvements

3
Comments
7 min read
Apache Solr - Hide/Redact Senstive Properties

Apache Solr - Hide/Redact Senstive Properties

3
Comments
2 min read
4 SQL Injection Techniques For Stealing Data

4 SQL Injection Techniques For Stealing Data

6
Comments
1 min read
You Owe Them

You Owe Them

38
Comments 3
3 min read
On Plaintext Login Details

On Plaintext Login Details

29
Comments 2
2 min read
Canadian Digital Security and Privacy Resources

Canadian Digital Security and Privacy Resources

9
Comments
2 min read
Awesome Ruby Security Resources

Awesome Ruby Security Resources

15
Comments
1 min read
We launched a new version of Hackmetrix! Still free, just better.

We launched a new version of Hackmetrix! Still free, just better.

7
Comments
1 min read
Enabling https on a bitnami prestashop instance with a custom domain

Enabling https on a bitnami prestashop instance with a custom domain

4
Comments 1
1 min read
The Intelligent Symbiosis

The Intelligent Symbiosis

6
Comments
9 min read
PHP 5 End of Life is upon us; why you should care.

PHP 5 End of Life is upon us; why you should care.

17
Comments 2
5 min read
How does Devise keep your passwords safe?

How does Devise keep your passwords safe?

12
Comments
1 min read
4 Reasons Why Blockchain Is Better At Protecting Information

4 Reasons Why Blockchain Is Better At Protecting Information

9
Comments
1 min read
Securing your Ruby and Rails Codebase

Securing your Ruby and Rails Codebase

31
Comments
1 min read
Containers Under Attack

Containers Under Attack

20
Comments 9
1 min read
How To Get Prepared For The 2018 GDPR Deadline?

How To Get Prepared For The 2018 GDPR Deadline?

6
Comments
2 min read
Best Tips To Help You Prepare GDPR For Data Protection

Best Tips To Help You Prepare GDPR For Data Protection

7
Comments
3 min read
Intelligent Security in Office 365

Intelligent Security in Office 365

8
Comments
3 min read
Blockchain to revolutionize Internet of Things

Blockchain to revolutionize Internet of Things

8
Comments
3 min read
loading...