DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SharePoint solutions as a spyware

SharePoint solutions as a spyware

1
Comments
6 min read
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities

Comments
4 min read
Understanding SSL/TLS in Kubernetes

Understanding SSL/TLS in Kubernetes

1
Comments
3 min read
How private are your class #private fields?

How private are your class #private fields?

Comments
3 min read
From ground to production: Deploying Workload Identities on AKS

From ground to production: Deploying Workload Identities on AKS

3
Comments 1
8 min read
From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

From Cryptocurrencies to Money Laundering: The Financial Infrastructure of Ransomware Gangs

Comments
5 min read
Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

Securing Digital Transactions: How Hyperswitch makes Payment Protection a Priority

3
Comments
2 min read
How to Keep Consumer Data Secure on Your E-Commerce Website

How to Keep Consumer Data Secure on Your E-Commerce Website

1
Comments
5 min read
Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

Api Rest .Net completa com JwtToken integração com api ViaCep utilizando padrão de arquitetura clean architecture - parte 3

1
Comments
11 min read
Hacking Access to Power Automate

Hacking Access to Power Automate

83
Comments 1
8 min read
The Case for Standards in Mobile App Security

The Case for Standards in Mobile App Security

4
Comments 1
4 min read
Production-Ready Vault Deployment on EC2: A Detailed Guide

Production-Ready Vault Deployment on EC2: A Detailed Guide

2
Comments
11 min read
Download a Website Certificate

Download a Website Certificate

1
Comments
2 min read
Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

Exploring KubeSpy : Day 19 of 50 days DevOps Tools Series

2
Comments
3 min read
An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

An In-depth Analysis of Path Traversal Vulnerability: Dirty Stream Attack

1
Comments
1 min read
How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

1
Comments
4 min read
AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

AWS Certified Solutions Architect Associate: Design de arquiteturas seguras - Parte 1

1
Comments
8 min read
Using Amazon Cognito with the user-password flow

Using Amazon Cognito with the user-password flow

4
Comments
8 min read
Using 1Password with External Secrets Operator in a GitOps way

Using 1Password with External Secrets Operator in a GitOps way

19
Comments
7 min read
Issue 55 of AWS Cloud Security Weekly

Issue 55 of AWS Cloud Security Weekly

3
Comments
1 min read
Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

Day 20 of my 90-day DevOps journey: Configuring Alerting Rules in Prometheus for Beginners and Intermediates

2
Comments
4 min read
Resourcely founder-led in person or virtual hands-on workshop

Resourcely founder-led in person or virtual hands-on workshop

Comments
1 min read
What's the Difference Between Session-Based Authentication and JWTs?

What's the Difference Between Session-Based Authentication and JWTs?

2
Comments
3 min read
How to decode a JWT

How to decode a JWT

2
Comments
1 min read
How to Deploy Infisical to Manage Application Secrets on Koyeb

How to Deploy Infisical to Manage Application Secrets on Koyeb

Comments
11 min read
loading...