DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Create Microsoft OAuth2 API

Create Microsoft OAuth2 API

Comments
1 min read
ABAC with Open Policy Agent (OPA)

ABAC with Open Policy Agent (OPA)

Comments
9 min read
How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

How to build a Python email-checker using the Mail7 API (and spot disposable addresses like TempMailbox)

1
Comments
4 min read
Understanding SSH: A Beginner's Guide

Understanding SSH: A Beginner's Guide

3
Comments
8 min read
Trust-First Growth for Crypto Tech: A Developer’s Playbook

Trust-First Growth for Crypto Tech: A Developer’s Playbook

Comments
5 min read
Let's Stop Overprotecting Confidential Information

Let's Stop Overprotecting Confidential Information

Comments
3 min read
Data Protection in Blockchain | CCPA Compliance

Data Protection in Blockchain | CCPA Compliance

3
Comments
3 min read
The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

The 8 Mathematical Defense Layers: How We Built Unhackable Vault Security

Comments
9 min read
Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quĂŞ na AWS?

Modelo de Responsabilidade Compartilhada do IAM: Quem faz o quĂŞ na AWS?

Comments
3 min read
GreHack 2025

GreHack 2025

1
Comments
3 min read
Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

Day 1 — Beginning the Security Advent: Defense in Depth (The Red Bear Inn)

6
Comments
2 min read
Your audit logs are about to break your database

Your audit logs are about to break your database

Comments
2 min read
Proper Key Derivation and Cryptographic Session Setup: Best Practices for Secure Communication

Proper Key Derivation and Cryptographic Session Setup: Best Practices for Secure Communication

Comments
2 min read
Modelo de Responsabilidade Compartilhada da AWS

Modelo de Responsabilidade Compartilhada da AWS

Comments
3 min read
Security Groups vs NACLs: A Simple Breakdown

Security Groups vs NACLs: A Simple Breakdown

2
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.