DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Zero Downtime migration of API Authentication

Zero Downtime migration of API Authentication

Comments
4 min read
Adding Developer Portal Access and Request Validation to a Firestore API

Adding Developer Portal Access and Request Validation to a Firestore API

Comments
7 min read
Why Zuplo Has the Best Damn Rate Limiter on the Planet

Why Zuplo Has the Best Damn Rate Limiter on the Planet

Comments
2 min read
Using PropelAuth to secure your API at the Gateway

Using PropelAuth to secure your API at the Gateway

Comments
3 min read
User-level auth in your Supabase API - Supaweek Day 2

User-level auth in your Supabase API - Supaweek Day 2

Comments
4 min read
Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Comments
4 min read
Rebuttal: API keys can do everything

Rebuttal: API keys can do everything

Comments
7 min read
Tips and Best Practices for API Authentication

Tips and Best Practices for API Authentication

Comments
10 min read
Simple HTTP Authentication: A Beginner’s Guide

Simple HTTP Authentication: A Beginner’s Guide

Comments
9 min read
Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Comments
7 min read
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Comments
9 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Comments
4 min read
OS Security & Encryption: Protect Your Data Like a Pro! 🔐

OS Security & Encryption: Protect Your Data Like a Pro! 🔐

Comments
2 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
Managing and Securing Access to AWS Resources Using IAM

Managing and Securing Access to AWS Resources Using IAM

Comments
6 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
BSides Austin 2024: Balancing AI Safety and Real-World Risks

BSides Austin 2024: Balancing AI Safety and Real-World Risks

7
Comments 1
6 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Why Security Testing is a Must-Have for Fintech Success

Why Security Testing is a Must-Have for Fintech Success

Comments
4 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
Enhancing the Efficacy of Mobile Banking with AI-Powered Testing

Enhancing the Efficacy of Mobile Banking with AI-Powered Testing

Comments
4 min read
Your rich text could be a cross-site scripting vulnerability

Your rich text could be a cross-site scripting vulnerability

Comments
8 min read
✋🏼🗺 🔥 CS Visualized: CORS

✋🏼🗺 🔥 CS Visualized: CORS

15
Comments
11 min read
Protect Your API Gateway with AWS WAF using CDK

Protect Your API Gateway with AWS WAF using CDK

Comments
5 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Azure OpenAI vs OpenAI

Azure OpenAI vs OpenAI

Comments
2 min read
⚖️ The Importance of Using ReentrancyGuard in Solidity Smart Contract

⚖️ The Importance of Using ReentrancyGuard in Solidity Smart Contract

Comments
3 min read
Formal Verification: An Example

Formal Verification: An Example

Comments
5 min read
Unlocking the Potential of Amazon CloudFront with VPC Origins: Overcoming WAF Bypass Challenges

Unlocking the Potential of Amazon CloudFront with VPC Origins: Overcoming WAF Bypass Challenges

2
Comments
3 min read
Building a Security System, with motion detection and time based settings using Arduino

Building a Security System, with motion detection and time based settings using Arduino

Comments
4 min read
Security news weekly round-up - 13th December 2024

Security news weekly round-up - 13th December 2024

Comments
3 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Comments
7 min read
How to scan a port and import the results using Metasploitable and Kali Linux

How to scan a port and import the results using Metasploitable and Kali Linux

Comments
2 min read
HTTPS for Django Development Environment

HTTPS for Django Development Environment

Comments
5 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
Preventing Clickjacking in Laravel Applications

Preventing Clickjacking in Laravel Applications

3
Comments
2 min read
Rootless Containers: What They Are and Why You Should Use Them

Rootless Containers: What They Are and Why You Should Use Them

Comments
3 min read
How to Create a Workspace in Metasploit Console

How to Create a Workspace in Metasploit Console

Comments
1 min read
How to Activate and Enable the PostgreSQL Service on Your Kali Linux System

How to Activate and Enable the PostgreSQL Service on Your Kali Linux System

Comments
1 min read
Building Cloud Security Efforts with AWS CAF and Well-Architected Framework

Building Cloud Security Efforts with AWS CAF and Well-Architected Framework

Comments
2 min read
Managing traffic using iptables firewall

Managing traffic using iptables firewall

Comments
3 min read
Trivy Vulnerability Scans Adnvanced Filtering

Trivy Vulnerability Scans Adnvanced Filtering

Comments
2 min read
Understanding SSL and Its Importance

Understanding SSL and Its Importance

1
Comments 2
2 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
Enforcing guardrails in the AWS environment

Enforcing guardrails in the AWS environment

2
Comments
7 min read
CCSP Study Guide: How to Prepare for the CCSP Exam

CCSP Study Guide: How to Prepare for the CCSP Exam

Comments
5 min read
What is the Mina Protocol? A Simple Guide

What is the Mina Protocol? A Simple Guide

6
Comments
3 min read
Preventing XML External Entity (XXE) Injection in Laravel Applications

Preventing XML External Entity (XXE) Injection in Laravel Applications

1
Comments
3 min read
Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

5
Comments
1 min read
VB .Net: Secure Password

VB .Net: Secure Password

Comments
1 min read
loading...