DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Future of Phishing Attacks with AI

Future of Phishing Attacks with AI

Comments
1 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Bitflip Attack on CBC: Change of the Ciphertext

Bitflip Attack on CBC: Change of the Ciphertext

Comments
5 min read
Why we as Europeans need to ditch US tech and how

Why we as Europeans need to ditch US tech and how

Comments 2
4 min read
Code Reviews with AI: a Developer Guide

Code Reviews with AI: a Developer Guide

4
Comments 3
10 min read
Introduction to Waffle: In-app WAF for Go Applications

Introduction to Waffle: In-app WAF for Go Applications

Comments
6 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 1
2 min read
Intro to Service Workers: Best Practices & Threat Mitigation

Intro to Service Workers: Best Practices & Threat Mitigation

2
Comments 1
4 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

7
Comments
4 min read
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
Why is GRC Important in 2025?

Why is GRC Important in 2025?

Comments
3 min read
Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

1
Comments
2 min read
Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

4
Comments
3 min read
Security news weekly round-up - 3rd January 2025

Security news weekly round-up - 3rd January 2025

1
Comments
3 min read
Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

1
Comments
2 min read
Understanding AWS Cognito: A Complete Guide to User Authentication and Management

Understanding AWS Cognito: A Complete Guide to User Authentication and Management

3
Comments 1
3 min read
Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Bulletproof JWT Authentication: Essential Security Patterns for Production Apps

Comments
2 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

2
Comments
2 min read
Password Hashing and Data Integrity in Real-World Implementation

Password Hashing and Data Integrity in Real-World Implementation

20
Comments 1
2 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
loading...