DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 7 API Authentication Methods Compared

Top 7 API Authentication Methods Compared

Comments
14 min read
API Security: Protecting the Backbone of Modern Web Apps

API Security: Protecting the Backbone of Modern Web Apps

54
Comments 3
5 min read
Part 1: AWS Config: Automate Your Cloud Compliance and Security

Part 1: AWS Config: Automate Your Cloud Compliance and Security

1
Comments
6 min read
Understanding AWS VPC and Its Components

Understanding AWS VPC and Its Components

1
Comments
2 min read
Kubernetes Security: Protecting Your Cluster Like Fort Knox 🔐

Kubernetes Security: Protecting Your Cluster Like Fort Knox 🔐

Comments
3 min read
Security Testing for SDETs: Automate Vulnerability Scans with OWASP ZAP

Security Testing for SDETs: Automate Vulnerability Scans with OWASP ZAP

1
Comments
6 min read
Next-Generation Cybersecurity: How AI is Strengthening Cloud Defenses

Next-Generation Cybersecurity: How AI is Strengthening Cloud Defenses

1
Comments
3 min read
AI safety controls at scale with Amazon Bedrock Guardrails

AI safety controls at scale with Amazon Bedrock Guardrails

52
Comments 6
6 min read
Essential Ingredient in Making TEEs Truly Secure? Remote Attestation.

Essential Ingredient in Making TEEs Truly Secure? Remote Attestation.

2
Comments 8
2 min read
🔒 Secure Your Sign-Ups: Email Validation in Node.js with Fastify, Prisma, and Nodemailer 📧

🔒 Secure Your Sign-Ups: Email Validation in Node.js with Fastify, Prisma, and Nodemailer 📧

5
Comments
6 min read
How to Secure Your Web App with JWT, OAuth, and Role-Based Access Control

How to Secure Your Web App with JWT, OAuth, and Role-Based Access Control

Comments
3 min read
Security Protocols

Security Protocols

Comments
1 min read
DIY — Building a Cost-Effective Questionnaire Automation with Bedrock

DIY — Building a Cost-Effective Questionnaire Automation with Bedrock

2
Comments
3 min read
Top 5 Cloud Storage Security Risks (and How to Avoid Them)

Top 5 Cloud Storage Security Risks (and How to Avoid Them)

Comments
12 min read
How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

How to Know if a Platform is Fake/Scam: Protect Yourself from Online Fraud

3
Comments 3
4 min read
Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

Custom User AUTH/Z for Strimzi Kafka: Integrating Your Corporate CERTIFICATE AUTHORITY Certs with Strimzi KAFKA

1
Comments
2 min read
Understanding the SLSA framework

Understanding the SLSA framework

Comments
11 min read
JWT vs. PASETO: Which One is Right for You?

JWT vs. PASETO: Which One is Right for You?

3
Comments 2
3 min read
API Security in E-commerce: Securing the Digital Marketplace

API Security in E-commerce: Securing the Digital Marketplace

1
Comments 1
12 min read
Data Engineer Salary for Freshers: Complete Guide for 2025

Data Engineer Salary for Freshers: Complete Guide for 2025

Comments 1
3 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
How Does BCrypt Verification Work?

How Does BCrypt Verification Work?

Comments
4 min read
Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Setting Up a Windows VM for Log Collection Using the ELK Stack - A Step-by-Step Guide

Comments
6 min read
GDPR Compliant Logging in NestJS: Masking User Data in Real Time

GDPR Compliant Logging in NestJS: Masking User Data in Real Time

1
Comments
5 min read
loading...