DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Intro to Service Workers: Best Practices & Threat Mitigation

Intro to Service Workers: Best Practices & Threat Mitigation

Comments
4 min read
Best Practices for Storing Access Tokens in the Browser

Best Practices for Storing Access Tokens in the Browser

Comments
2 min read
ACID in Databases: A Comprehensive Guide

ACID in Databases: A Comprehensive Guide

Comments
5 min read
Smart Contract Security

Smart Contract Security

Comments
3 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

4
Comments
4 min read
Gamification in Vaccination Centers – Does it Work?

Gamification in Vaccination Centers – Does it Work?

Comments
1 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Open Source Code and Security of Crypto Exchanges: Why It Matters for Developers?

Comments
2 min read
Why Current Methods Fail to Measure Real Vulnerability Risks?

Why Current Methods Fail to Measure Real Vulnerability Risks?

Comments
2 min read
Just published my first web service - Automated security scanning for webapps

Just published my first web service - Automated security scanning for webapps

Comments
1 min read
How to Integrate AI Solutions into Your Enterprise System for Maximum ROI

How to Integrate AI Solutions into Your Enterprise System for Maximum ROI

Comments
4 min read
Tutorial: How to protect your business from referral fraud

Tutorial: How to protect your business from referral fraud

Comments
11 min read
How to integrate Docker Scout with Azure Container Registry

How to integrate Docker Scout with Azure Container Registry

Comments
4 min read
Effortless Wazuh v4.10.0 upgrade using Docker

Effortless Wazuh v4.10.0 upgrade using Docker

Comments
2 min read
Hacking My Way Into Cybersecurity — The Beginning of My Journey!

Hacking My Way Into Cybersecurity — The Beginning of My Journey!

1
Comments
2 min read
Deploying a Cloudfront Lambda Image Optimization stack with Terraform Part 1 - Cloudfront

Deploying a Cloudfront Lambda Image Optimization stack with Terraform Part 1 - Cloudfront

1
Comments
4 min read
Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Daily Quantum Learning #6 - Quantum Communication and Quantum Key Distribution

Comments
3 min read
🔐 DeepSeek AI: Balance Power & Privacy 🤖

🔐 DeepSeek AI: Balance Power & Privacy 🤖

Comments
1 min read
Java Security Practices

Java Security Practices

Comments
3 min read
Passwordless: A Password-Free Future, But What Are the Differences?

Passwordless: A Password-Free Future, But What Are the Differences?

2
Comments
4 min read
Attack Surface Mapping: A Comprehensive Guide

Attack Surface Mapping: A Comprehensive Guide

Comments
4 min read
Hidden Vulnerabilities - DeepSeek / LLM's

Hidden Vulnerabilities - DeepSeek / LLM's

8
Comments 2
2 min read
Web Security with Content Security Policy (CSP) and JavaScript

Web Security with Content Security Policy (CSP) and JavaScript

Comments
4 min read
Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Comments
10 min read
Understanding Proxy Servers

Understanding Proxy Servers

Comments
4 min read
loading...