DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Access Token or ID Token? Which to Use and Why?

Access Token or ID Token? Which to Use and Why?

Comments
3 min read
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Comments
3 min read
OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
JSON Web Tokens (JWTs): A Comprehensive Guide

JSON Web Tokens (JWTs): A Comprehensive Guide

Comments
3 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
What does CORS really do? 🤔

What does CORS really do? 🤔

1
Comments
3 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments 1
2 min read
How to Use ENV variables in GitHub Actions

How to Use ENV variables in GitHub Actions

6
Comments
3 min read
Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Comments
5 min read
Building a Secure Event Booking App with FACEIO and Svelte

Building a Secure Event Booking App with FACEIO and Svelte

6
Comments
9 min read
Issue 68 of AWS Cloud Security Weekly

Issue 68 of AWS Cloud Security Weekly

2
Comments
2 min read
The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses

The Role of AI in Modern Cybersecurity: Tackling Social Engineering Threats with Advanced Defenses

10
Comments
8 min read
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

1
Comments
4 min read
APIs and Security Best Practices: JavaScript and Python Examples

APIs and Security Best Practices: JavaScript and Python Examples

1
Comments 1
5 min read
Essential SQL Database Security Practices to Protect Your Data

Essential SQL Database Security Practices to Protect Your Data

Comments
4 min read
How To Find Zombie Hosts With Nmap?

How To Find Zombie Hosts With Nmap?

Comments
2 min read
5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments 1
4 min read
Access Microsoft 365 resources from custom on premise application - setup

Access Microsoft 365 resources from custom on premise application - setup

2
Comments 1
9 min read
AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

3
Comments
2 min read
Security Configuration in HTTP headers

Security Configuration in HTTP headers

Comments
2 min read
Kubernetes Service Accounts: Guide

Kubernetes Service Accounts: Guide

8
Comments 1
10 min read
Understanding Namespaces in Kubernetes

Understanding Namespaces in Kubernetes

6
Comments
6 min read
Kubernetes Network Policies

Kubernetes Network Policies

5
Comments
6 min read
loading...