DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Top 10 Cybersecurity Threats You Need to Know About This Year 2024

Comments
3 min read
StatefulSets in Kubernetes

StatefulSets in Kubernetes

6
Comments
8 min read
The Human Hack: When Cybercriminals Become Master Manipulators

The Human Hack: When Cybercriminals Become Master Manipulators

Comments
2 min read
Kubernetes Probes

Kubernetes Probes

5
Comments
6 min read
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

1
Comments
1 min read
🔒 Protégez votre site WordPress : Sécurité et Backup, les indispensables pour bien débuter 🔒

🔒 Protégez votre site WordPress : Sécurité et Backup, les indispensables pour bien débuter 🔒

1
Comments
2 min read
BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

1
Comments
43 min read
Security in the Cloud: Your Role in the Shared Responsibility Model

Security in the Cloud: Your Role in the Shared Responsibility Model

5
Comments
8 min read
Securing Your Spring Boot Application with Spring Security

Securing Your Spring Boot Application with Spring Security

2
Comments
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Comments
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It

OAuth2 Client Credentials Grant Type: When and How to Use It

Comments
4 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Comments
4 min read
OAuth2 vs. OpenID Connect: Understanding the Differences

OAuth2 vs. OpenID Connect: Understanding the Differences

Comments
3 min read
Spring Security: Implementing JWT Authentication in Your Java Application

Spring Security: Implementing JWT Authentication in Your Java Application

Comments
4 min read
Why You Should Be Using a Password Manager

Why You Should Be Using a Password Manager

Comments
3 min read
Understanding VPNs: How They Work and Why You Need One

Understanding VPNs: How They Work and Why You Need One

Comments
4 min read
Passwordless Authentication

Passwordless Authentication

Comments
3 min read
Beware of Spring Boot Actuator Endpoint env: A Security Alert

Beware of Spring Boot Actuator Endpoint env: A Security Alert

1
Comments
3 min read
Understanding Multi-Factor Authentication: A Deep Dive into MFA

Understanding Multi-Factor Authentication: A Deep Dive into MFA

1
Comments
4 min read
Securing Software Development with Secrets Vaults: A Comprehensive Guide

Securing Software Development with Secrets Vaults: A Comprehensive Guide

Comments
3 min read
Understanding CSRF Attacks: Safeguarding Your Web Applications

Understanding CSRF Attacks: Safeguarding Your Web Applications

1
Comments
3 min read
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Comments
2 min read
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

Comments
3 min read
loading...