DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CrowdStrike Blew Up the Internet

CrowdStrike Blew Up the Internet

Comments
2 min read
AWS Security Essentials: From Prevention to Detection

AWS Security Essentials: From Prevention to Detection

1
Comments
4 min read
How to stop form spam without using ReCaptcha?

How to stop form spam without using ReCaptcha?

7
Comments 11
2 min read
Ensuring GCE instances have full access to GCP APIs

Ensuring GCE instances have full access to GCP APIs

Comments
1 min read
Security news weekly round-up - 19th July 2024

Security news weekly round-up - 19th July 2024

1
Comments
3 min read
Secure and Resilient Design

Secure and Resilient Design

2
Comments
16 min read
Enhancing OIDC security with demonstrating proof of possession (DPoP)

Enhancing OIDC security with demonstrating proof of possession (DPoP)

15
Comments
3 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

Comments
6 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

1
Comments
2 min read
Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

6
Comments
4 min read
Why we built Resourcely

Why we built Resourcely

2
Comments
6 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

5
Comments
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

4
Comments
3 min read
Configuring Routes for a Web Application using Azure Firewall (Part 4)

Configuring Routes for a Web Application using Azure Firewall (Part 4)

Comments
2 min read
SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Simple OAuth 2.0 Framework for Authentication (Freeware)

Simple OAuth 2.0 Framework for Authentication (Freeware)

Comments
1 min read
Issue 53 of AWS Cloud Security Weekly

Issue 53 of AWS Cloud Security Weekly

4
Comments
1 min read
Security Meetup

Security Meetup

Comments
1 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

6
Comments
2 min read
Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

5
Comments
8 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
1 min read
Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
3 min read
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
Up(sun) and running with Rust: The game-changer in systems programming

Up(sun) and running with Rust: The game-changer in systems programming

Comments
1 min read
loading...