DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

7
Comments 1
3 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
.NET 8.0 - Securing the API with JWT Bearer Token

.NET 8.0 - Securing the API with JWT Bearer Token

158
Comments 1
5 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

6
Comments 2
4 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

26
Comments 2
2 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

23
Comments 1
5 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

Comments
5 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

1
Comments
2 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
Integrating reCAPTCHA v3 in Next.js

Integrating reCAPTCHA v3 in Next.js

37
Comments 2
2 min read
Dev: Security

Dev: Security

Comments
3 min read
CodeBehind 2.7 Released, Role Access Added!

CodeBehind 2.7 Released, Role Access Added!

1
Comments
7 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Proposal - Blockchain Coordination

Proposal - Blockchain Coordination

Comments
5 min read
5 Auth0 Gotchas to Consider

5 Auth0 Gotchas to Consider

Comments
3 min read
Types of Computer Security Threats

Types of Computer Security Threats

1
Comments
8 min read
Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

6
Comments
7 min read
Mastering Cloudflare Ruleset Engine with Terraform

Mastering Cloudflare Ruleset Engine with Terraform

11
Comments 1
5 min read
How to Model Cloud-Native Authorization

How to Model Cloud-Native Authorization

2
Comments
11 min read
Security news weekly round-up - 14th June 2024

Security news weekly round-up - 14th June 2024

1
Comments
3 min read
Build an Antivirus with Python (Beginners Guide)

Build an Antivirus with Python (Beginners Guide)

14
Comments
9 min read
5 Essential Cybersecurity Tips to Secure Your Business in 2024

5 Essential Cybersecurity Tips to Secure Your Business in 2024

1
Comments
3 min read
loading...