DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introduction to Web Application Firewalls (WAF)

Introduction to Web Application Firewalls (WAF)

Comments
1 min read
A killer explanation of Secret-Key and Public-Key Cryptography

A killer explanation of Secret-Key and Public-Key Cryptography

Comments
4 min read
Polyfills - a filler or a gaping hole? (Part-1)

Polyfills - a filler or a gaping hole? (Part-1)

1
Comments
3 min read
PREVENT YOUR BACKEND FROM SQL INJECTION

PREVENT YOUR BACKEND FROM SQL INJECTION

1
Comments 1
3 min read
Keyper by Jarrid: Introduce Integrated Key + Role Management

Keyper by Jarrid: Introduce Integrated Key + Role Management

1
Comments
3 min read
CRIANDO UM SERVIÇO DE AUTENTICAÇÃO EM PYTHON UTILIZANDO SALT

CRIANDO UM SERVIÇO DE AUTENTICAÇÃO EM PYTHON UTILIZANDO SALT

2
Comments
4 min read
Keyper by Jarrid: Introduce Secure Data Flow

Keyper by Jarrid: Introduce Secure Data Flow

1
Comments
3 min read
Spring Security 102: From Setup to Secure Endpoints in Spring Boot

Spring Security 102: From Setup to Secure Endpoints in Spring Boot

5
Comments
3 min read
Meme Monday

Meme Monday

11
Comments 1
1 min read
🛡️ Effective Vulnerability Monitoring in Kubernetes

🛡️ Effective Vulnerability Monitoring in Kubernetes

Comments
7 min read
How to build a secure voting web app with FACEIO

How to build a secure voting web app with FACEIO

21
Comments
13 min read
Afterlife.exe: The Afterlife of Your Digital Footprint

Afterlife.exe: The Afterlife of Your Digital Footprint

3
Comments 2
3 min read
Spring Security 101: Understanding the Basics

Spring Security 101: Understanding the Basics

6
Comments
3 min read
Designing a Secure Architecture for Distributed Systems

Designing a Secure Architecture for Distributed Systems

2
Comments 2
5 min read
Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Integrating Governance, Processes, People, and Technology with Cloud-Native Application Protection Platforms (CNAPP)

Comments
8 min read
Proxmox Security Series:Securing Root Access

Proxmox Security Series:Securing Root Access

6
Comments
5 min read
Enhancing Android App Security: Best Practices

Enhancing Android App Security: Best Practices

1
Comments 2
4 min read
AWS Security Group Rules

AWS Security Group Rules

9
Comments
2 min read
Introduction to JWT and OAuth 2.0

Introduction to JWT and OAuth 2.0

3
Comments
4 min read
Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Leveraging IRSA with AWS SES To Send Emails from EKS Pods

Comments
6 min read
Sumo Tatami x Serverspace

Sumo Tatami x Serverspace

Comments
2 min read
Securing Microservices with Spring Security: Implementing JWT

Securing Microservices with Spring Security: Implementing JWT

43
Comments 1
14 min read
Ethical Hacking : Users password cracking

Ethical Hacking : Users password cracking

5
Comments
17 min read
Security news weekly round-up - 23rd August 2024

Security news weekly round-up - 23rd August 2024

2
Comments
4 min read
A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

A Modern Approach to Secure APIs with Node.js, Express, TypeScript, and ESM

4
Comments
7 min read
loading...