DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Using git Conditionals to Manage Your Git Identities

Using git Conditionals to Manage Your Git Identities

2
Comments
3 min read
Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

1
Comments
2 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

5
Comments
4 min read
Why Authorization Matters and How Cerbos Revolutionizes It

Why Authorization Matters and How Cerbos Revolutionizes It

Comments
5 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
From Data Breach to Insight: Exploring the Intersection of Cybersecurity and Communication

From Data Breach to Insight: Exploring the Intersection of Cybersecurity and Communication

1
Comments 2
3 min read
Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

Splitting Secrets Like a Spy: Shamir’s Secret Sharing in Go

1
Comments
3 min read
Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

2
Comments
2 min read
Understanding AWS Cognito: A Complete Guide to User Authentication and Management

Understanding AWS Cognito: A Complete Guide to User Authentication and Management

2
Comments 1
3 min read
DevSecOps: How to Integrate Security into Your DevOps Workflow

DevSecOps: How to Integrate Security into Your DevOps Workflow

Comments
2 min read
Stop Using Go Templates for SQL (Until You Read This)

Stop Using Go Templates for SQL (Until You Read This)

Comments
2 min read
Securing Client Communication: A Must for SMEs

Securing Client Communication: A Must for SMEs

Comments
1 min read
Modernizing Security Operations with Zero Trust Architecture on AWS

Modernizing Security Operations with Zero Trust Architecture on AWS

1
Comments
2 min read
Tutorial: How to protect your business from referral fraud

Tutorial: How to protect your business from referral fraud

Comments
11 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
JSON + Prometheus SECURELY

JSON + Prometheus SECURELY

Comments
1 min read
Best Practices for Secure PHP Coding

Best Practices for Secure PHP Coding

1
Comments
3 min read
Account Email and Password Change using .NET Identity

Account Email and Password Change using .NET Identity

1
Comments
6 min read
Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Automating Kubernetes Sealed Secrets Management with Jenkins in a Multi-Cloud Environment-Part2

Comments
3 min read
Hidden Vulnerabilities - DeepSeek / LLM's

Hidden Vulnerabilities - DeepSeek / LLM's

8
Comments 2
2 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
5 Cybersecurity Projects Every Computer Science Student Should Try

5 Cybersecurity Projects Every Computer Science Student Should Try

2
Comments
3 min read
🔐 DeepSeek AI: Balance Power & Privacy 🤖

🔐 DeepSeek AI: Balance Power & Privacy 🤖

Comments
1 min read
loading...