DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Outil de Cybersécurité du Jour - Sep 21, 2025

Outil de Cybersécurité du Jour - Sep 21, 2025

1
Comments
3 min read
Top Dependency Scanners: A Comprehensive Guide

Top Dependency Scanners: A Comprehensive Guide

Comments
6 min read
⚙️ New TEE vulnerabilities what’s up and who’s affected

⚙️ New TEE vulnerabilities what’s up and who’s affected

2
Comments 4
1 min read
30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

30-Day Windows 10 Exit Plan: Inventory, Secure, Migrate

2
Comments
3 min read
AWS: creating an OpenSearch Service cluster and configuring authentication and authorization

AWS: creating an OpenSearch Service cluster and configuring authentication and authorization

Comments
14 min read
Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.

Laravel APP_KEY vs Password Hashing: What Every Developer Should Know About Encryption & Hashing.

4
Comments
3 min read
Outil de Cybersécurité du Jour - Sep 16, 2025

Outil de Cybersécurité du Jour - Sep 16, 2025

Comments
3 min read
TemplateScorer

TemplateScorer

Comments
3 min read
When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

When TEEs Fail Gracefully: How Oasis Survived the Battering RAM and Wiretap Attacks

2
Comments 3
3 min read
JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

JWT vs OAuth 1.0 vs OAuth 2.0, What’s the Difference and When to Use Each?

Comments
4 min read
Safely Collect User Feedback with Cloudflare Workers + Slack

Safely Collect User Feedback with Cloudflare Workers + Slack

4
Comments
4 min read
From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

From Permanent Access to Just-in-Time: A Startup's IAM Journey Part 3

1
Comments
3 min read
Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Bringing Shadow AI Into the Light: How Leaders Can Balance Innovation and Control

Comments
4 min read
From SOP to CORS: Understanding the Web’s Cross‑Origin Security Model

From SOP to CORS: Understanding the Web’s Cross‑Origin Security Model

Comments
11 min read
7 Tips for Hardening Nginx on Ubuntu 22.04 for High‑Traffic Sites

7 Tips for Hardening Nginx on Ubuntu 22.04 for High‑Traffic Sites

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.