DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
JavaScript Security Best Practices: Prevent Vulnerabilities | Mbloging

JavaScript Security Best Practices: Prevent Vulnerabilities | Mbloging

Comments
2 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

Comments
3 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

1
Comments
1 min read
Account Email and Password Change using .NET Identity

Account Email and Password Change using .NET Identity

1
Comments
6 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
MitM Attacks in Laravel: Prevention and Coding Examples

MitM Attacks in Laravel: Prevention and Coding Examples

2
Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

Ultimate Guide to API Security in .NET: Mastering JWT, OAuth, and Best Practices

11
Comments
4 min read
Ransomware: A Wake-Up Call for the Digital Age

Ransomware: A Wake-Up Call for the Digital Age

1
Comments 1
4 min read
Generate your Let's Encrypt Digital Certificates for all your domains using Apache

Generate your Let's Encrypt Digital Certificates for all your domains using Apache

Comments
3 min read
Announcing RODiT API: Revolutionizing API Authentication

Announcing RODiT API: Revolutionizing API Authentication

Comments
1 min read
IP Whitelisting, the silent killer

IP Whitelisting, the silent killer

Comments
2 min read
Configure SSH Login from Windows to Windows

Configure SSH Login from Windows to Windows

9
Comments
3 min read
Authorization using .NET Identity

Authorization using .NET Identity

5
Comments
6 min read
Angular Security Best Practices Guide

Angular Security Best Practices Guide

1
Comments
6 min read
New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

New Infostealer: FAKE CAPTCHA and Human Verification (Novel Lumma Malware); Detection, Prevention, and Incident Response.

13
Comments
5 min read
Building a Next.js login page

Building a Next.js login page

9
Comments
19 min read
Configuring AWS Vault with the Pass Backend for Secure Credential Management on Linux

Configuring AWS Vault with the Pass Backend for Secure Credential Management on Linux

Comments
4 min read
Query AWS CloudTrail Logs Locally with SQL

Query AWS CloudTrail Logs Locally with SQL

7
Comments
3 min read
Automated reasoning and generative AI: Harness creativity with formal verifications

Automated reasoning and generative AI: Harness creativity with formal verifications

6
Comments 2
12 min read
loading...