DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
GemCity TECH Mini-Conference

GemCity TECH Mini-Conference

6
Comments 1
4 min read
Security news weekly round-up - 4th April 2025

Security news weekly round-up - 4th April 2025

2
Comments
3 min read
Access Control and Zero-Knowledge

Access Control and Zero-Knowledge

Comments
4 min read
Understanding CVE-2025-29927 - The Next.js Vulnerability

Understanding CVE-2025-29927 - The Next.js Vulnerability

1
Comments
3 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments 1
2 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

1
Comments
10 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
The Hack That Made People Rich.....in Subway Surfers

The Hack That Made People Rich.....in Subway Surfers

2
Comments 2
4 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

1
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

1
Comments
10 min read
How to Prevent SQL Injection

How to Prevent SQL Injection

1
Comments
2 min read
Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Comments
1 min read
AI Security: The Next Frontier in Infrastructure Protection

AI Security: The Next Frontier in Infrastructure Protection

Comments
4 min read
WP Query Functions – What to use and when

WP Query Functions – What to use and when

Comments
3 min read
Azure DevOps Security Best Practices

Azure DevOps Security Best Practices

Comments
14 min read
How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

Comments
1 min read
Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Linux System Auditing With Auditd: Custom Rules and Configuration (Part 1)

Comments
1 min read
Cloud Security vs Traditional Security: Key Differences

Cloud Security vs Traditional Security: Key Differences

Comments
4 min read
Mastering MySQL Security: Key Steps to Protect Your Database

Mastering MySQL Security: Key Steps to Protect Your Database

Comments
2 min read
loading...