DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Weaknesses in Two-Factor Authentication

Weaknesses in Two-Factor Authentication

2
Comments 1
1 min read
How I'm Learning SpiceDB

How I'm Learning SpiceDB

7
Comments
4 min read
Working with Git Remotes

Working with Git Remotes

7
Comments
6 min read
Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

3
Comments
6 min read
Kubernetes Horizontal Pod Autoscaler

Kubernetes Horizontal Pod Autoscaler

6
Comments
7 min read
nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

nocaptcha: Replacing CAPTCHAs with Single-use Passkeys

Comments
1 min read
Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Understanding SSL/TLS: The Role of Encryption and Security Protocols in Internet Communication

Comments
6 min read
Setting up WireGuard VPN with WAG for Enhanced Security and MFA

Setting up WireGuard VPN with WAG for Enhanced Security and MFA

3
Comments 3
4 min read
Move hardcoded secrets to a Secrets Manager

Move hardcoded secrets to a Secrets Manager

1
Comments
2 min read
AWS Web Application Firewall (WAF)

AWS Web Application Firewall (WAF)

5
Comments
6 min read
Custom Role-Based Access Control in NestJS Using Custom Guards

Custom Role-Based Access Control in NestJS Using Custom Guards

1
Comments
3 min read
🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

🇫🇷 Framework Heroes News : la veille sur les frameworks pour la semaine 2024/40

Comments
3 min read
Beyond AES — Modern Encryption for Laravel with XChaCha20

Beyond AES — Modern Encryption for Laravel with XChaCha20

Comments
2 min read
HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant

HardenEKS: The Easy Way to keep your AWS EKS clusters secure and compliant

7
Comments
8 min read
SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

SOSS Fusion 2024: Uniting Security Minds for the Future of Open Source

Comments
7 min read
How to use GitHub Personal Access Tokens Securely

How to use GitHub Personal Access Tokens Securely

5
Comments
6 min read
Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Secure Game Authentication: Encryption Techniques and their Role in Unity Game Development

Comments
6 min read
How to Use Kubernetes CronJob

How to Use Kubernetes CronJob

5
Comments
6 min read
Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Unlocking Wireless Security: The Roles of Managed and Monitor Modes

Comments
3 min read
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

11
Comments
6 min read
Debian 12 … is amazing! How to: Create your custom codehouse #4 [Security Mechanisms Against Network-Based Attacks]

Debian 12 … is amazing! How to: Create your custom codehouse #4 [Security Mechanisms Against Network-Based Attacks]

1
Comments 1
17 min read
Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Creating a Global .gitignore File as an Extra Line of Defense Against Bad Commits

Comments
2 min read
Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

Mastering Docker: Essential Best Practices for Efficiency and Security👮🏻

90
Comments 12
4 min read
Managing Dependabot PRs with dependabot-pr-manager 🤖

Managing Dependabot PRs with dependabot-pr-manager 🤖

26
Comments 4
3 min read
Role-Based Access Control (RBAC) with Feature-Centric Approach

Role-Based Access Control (RBAC) with Feature-Centric Approach

3
Comments
3 min read
loading...