DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Ethernet and Fiber Op

Understanding Ethernet and Fiber Op

1
Comments
3 min read
Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

Beyond the Firewall: In-Depth Defense Strategies for Blue Teams, Part 1

1
Comments
4 min read
What's New With AWS Security? | January Edition

What's New With AWS Security? | January Edition

Comments
3 min read
Authorization and Authentication in Django

Authorization and Authentication in Django

1
Comments
2 min read
How to Host Static Webpage-CloudFront with S3 (part1)

How to Host Static Webpage-CloudFront with S3 (part1)

3
Comments
4 min read
My Developer Nightmare

My Developer Nightmare

10
Comments
3 min read
Is Using Firebase on Client-Side Safe? 🔒

Is Using Firebase on Client-Side Safe? 🔒

7
Comments
3 min read
Microsoft Entra ID

Microsoft Entra ID

Comments
1 min read
Azure Monitor Parte 2: Dicas para Garantir a Segurança de VMs no Azure

Azure Monitor Parte 2: Dicas para Garantir a Segurança de VMs no Azure

1
Comments
3 min read
Enhancing Security: Passport.Js

Enhancing Security: Passport.Js

1
Comments
3 min read
How to protect sensitive information in SharePoint Online using Purview Sensitivity Labels

How to protect sensitive information in SharePoint Online using Purview Sensitivity Labels

3
Comments
11 min read
DIY Home Security Camera System

DIY Home Security Camera System

147
Comments 8
8 min read
How to Do Authorization - A Decision Framework: Part 2

How to Do Authorization - A Decision Framework: Part 2

25
Comments
5 min read
Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Web Security 101: Understanding and Mitigating Risks of Broken Authentication

Comments
5 min read
JWT can fit as an authentication system with a blacklist technique

JWT can fit as an authentication system with a blacklist technique

7
Comments 11
3 min read
Elastic Search 8.x : ELK Setup over TLS/SSL

Elastic Search 8.x : ELK Setup over TLS/SSL

4
Comments
13 min read
Banana encryption: Decoding Caesar Cipher with Power Automate

Banana encryption: Decoding Caesar Cipher with Power Automate

14
Comments 4
2 min read
Security Logger

Security Logger

Comments
2 min read
AWS Locksmith: Encrypting S3 and EBS with Amazon KMS

AWS Locksmith: Encrypting S3 and EBS with Amazon KMS

10
Comments 3
4 min read
Odoo security concept

Odoo security concept

8
Comments 4
7 min read
Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Defending Against Cross-Site Scripting (XSS) Best Practices for Web Security

Comments
2 min read
Navigating the Cloud: Unveiling the Best Lifetime Plans for Cloud Storage

Navigating the Cloud: Unveiling the Best Lifetime Plans for Cloud Storage

Comments
4 min read
This is a post for newbies to ask for help

This is a post for newbies to ask for help

2
Comments 3
1 min read
Best Practices in API Key Management and Utilization

Best Practices in API Key Management and Utilization

2
Comments
3 min read
How to Setup CloudFront with S3 bucket for Presigned URLs

How to Setup CloudFront with S3 bucket for Presigned URLs

4
Comments
4 min read
loading...