DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security news weekly round-up - 31 May 2024

Security news weekly round-up - 31 May 2024

Comments
4 min read
Implementing Role Based Access Control in SvelteKit

Implementing Role Based Access Control in SvelteKit

28
Comments
12 min read
Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Securing Your Magento 2 Store: Top 12 Security Measures for Enhanced Protection

Comments
2 min read
RSA Conference 2024: AI and the Future Of Security

RSA Conference 2024: AI and the Future Of Security

Comments
9 min read
Public IP Over VPN in Azure

Public IP Over VPN in Azure

Comments
5 min read
Row Level Security In SQL Server

Row Level Security In SQL Server

Comments
3 min read
My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

My Analysis Of Anti Bot Captchas and their Advantages And Disadvantages

2
Comments
5 min read
What is AWS Identity and Access Management (IAM)?

What is AWS Identity and Access Management (IAM)?

5
Comments
6 min read
Security Protocol to connect AWS SES

Security Protocol to connect AWS SES

Comments
3 min read
It turns out, it's not difficult to remove all passwords from our Docker Compose files

It turns out, it's not difficult to remove all passwords from our Docker Compose files

2
Comments
4 min read
**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

**Pac-Man y los Comandos de la Línea de Comandos: ¡Come, Ejecuta, Repite! **🍒

1
Comments
10 min read
Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Upstream preview: Vincent Danen of Red Hat calls for a patch management revolution

Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

Comments
3 min read
Entenda o que é CORS (Cross-Origin Resource Sharing)

Entenda o que é CORS (Cross-Origin Resource Sharing)

2
Comments
3 min read
Blocking unsafe open source dependencies in pull requests with Minder and OSV.dev

Blocking unsafe open source dependencies in pull requests with Minder and OSV.dev

2
Comments
1 min read
Overview of AWS Config: Concepts and Components

Overview of AWS Config: Concepts and Components

1
Comments
8 min read
Security considerations of configuration management

Security considerations of configuration management

5
Comments
4 min read
The Pyramid of Pain: A Threat Intelligence Concept

The Pyramid of Pain: A Threat Intelligence Concept

2
Comments
1 min read
Security: You might want to quit peppering Passwords Now!

Security: You might want to quit peppering Passwords Now!

4
Comments
2 min read
Security Best Practices in Web Development

Security Best Practices in Web Development

5
Comments
2 min read
Less Time Learning, More Time Building

Less Time Learning, More Time Building

6
Comments
5 min read
Simple + Secure Password Generator with Python🔐

Simple + Secure Password Generator with Python🔐

1
Comments
1 min read
How AWS Shield Protects You From DDoS?

How AWS Shield Protects You From DDoS?

2
Comments
4 min read
Can Artificial Intelligence Be Trusted With Our Security?

Can Artificial Intelligence Be Trusted With Our Security?

Comments
4 min read
What's New With AWS Security? | March Edition

What's New With AWS Security? | March Edition

1
Comments
3 min read
loading...