DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Never Commit Secrets Again: Generate .env Files from AWS Secrets Manager

Comments
4 min read
ASP.NET CORE - How to using IAuthorizationRequirementData

ASP.NET CORE - How to using IAuthorizationRequirementData

Comments
2 min read
Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀

Top 10 DevSecOps Tools Dominating 2026: Secure Your Pipeline Like a Pro 🔒🚀

9
Comments 2
3 min read
JWT vs PASETO: A Comprehensive Comparison

JWT vs PASETO: A Comprehensive Comparison

Comments
3 min read
🔒 Beginner’s Guide to AWS IAM Hardening

🔒 Beginner’s Guide to AWS IAM Hardening

Comments
8 min read
📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

📅 Day 14 | AWS NACL — Subnet-Level Security in AWS 🔐

Comments
3 min read
I scanned 37 sites from Hacker News for leaked secrets. One had 6.

I scanned 37 sites from Hacker News for leaked secrets. One had 6.

Comments
2 min read
Building a FinTech Approval System with Symfony 7.4

Building a FinTech Approval System with Symfony 7.4

Comments
8 min read
n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

n8n 2.0: Secure Workflow Automation with Enhanced Reliability & Performance

Comments
5 min read
[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

[Part 2] - Practice Azure services - Enhance security by using Key Vault and App Configuration

Comments
2 min read
Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Introducing dssrf: A Safe‑by‑Construction SSRF Defense Library for Node.js

Comments
1 min read
Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Uncounted Tokens: The Game of Attack and Defense in AI Gateway Rate Limiting

Comments
3 min read
Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Ed25519 + Merkle Tree + UUIDv7 = Building Tamper-Proof Decision Logs

Comments
9 min read
Day 12 — React2Shell CVE (The Mines)

Day 12 — React2Shell CVE (The Mines)

Comments
2 min read
How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

How to Quickly Inspect & Decode JWTs in Postman (The Right Way)

Comments
3 min read
Fortifying Your Data: Row-Level Security in Power BI.

Fortifying Your Data: Row-Level Security in Power BI.

Comments
4 min read
Rust Weekly Log: Crypto Foundations & Clean Architecture

Rust Weekly Log: Crypto Foundations & Clean Architecture

Comments
1 min read
The Perfect Grammar That Defeats Us: Why AI Doesn't Need to Be Smart to Win

The Perfect Grammar That Defeats Us: Why AI Doesn't Need to Be Smart to Win

Comments
6 min read
Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Traata: A Modern, Developer-First Password Manager Built for Security, Speed, and Sanity

Comments
2 min read
# Regra de segurança no Android nativo com SharedPreferences

# Regra de segurança no Android nativo com SharedPreferences

Comments
2 min read
Sonarqube Nedir

Sonarqube Nedir

Comments
4 min read
Experimental Hono auth npm package

Experimental Hono auth npm package

Comments
2 min read
Unlocking Web Security: Mastering Authentication in the Digital Age

Unlocking Web Security: Mastering Authentication in the Digital Age

Comments
2 min read
Modernizing Enterprise IT: The Unified Internal Portal

Modernizing Enterprise IT: The Unified Internal Portal

Comments
3 min read
Beyond the Wire: Encrypting Messages Where the Message Never Exists

Beyond the Wire: Encrypting Messages Where the Message Never Exists

Comments
3 min read
loading...