DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Guide To Digital Privacy Part 2

A Guide To Digital Privacy Part 2

3
Comments 1
5 min read
How to steal a website and how to prevent it

How to steal a website and how to prevent it

9
Comments 2
4 min read
Getting Started In Cyber security - A 2023 Guide

Getting Started In Cyber security - A 2023 Guide

4
Comments
4 min read
What are cryptocurrency, bitcoin and web3 in 2023? (Explain Like, I'm Five!)

What are cryptocurrency, bitcoin and web3 in 2023? (Explain Like, I'm Five!)

3
Comments
2 min read
Securing your NextJS Web Application with AWS Amplify and Cognito

Securing your NextJS Web Application with AWS Amplify and Cognito

6
Comments
2 min read
Yet Another Newsletter LOL: Super Charge!

Yet Another Newsletter LOL: Super Charge!

6
Comments
4 min read
Kubernetes: ServiceAccount with AWS IAM Role for Kubernetes Pod

Kubernetes: ServiceAccount with AWS IAM Role for Kubernetes Pod

2
Comments
5 min read
AWS re:Invent 2022: Security Session Notes 📝

AWS re:Invent 2022: Security Session Notes 📝

5
Comments
5 min read
WHY YOUR STATE IS BEHIND.(react.js)

WHY YOUR STATE IS BEHIND.(react.js)

6
Comments 2
3 min read
What is Subnet on AWS VPC?

What is Subnet on AWS VPC?

12
Comments
2 min read
Better two factor authentication experiences with WebOTP

Better two factor authentication experiences with WebOTP

52
Comments 14
5 min read
Integrating Keycloak Identity Management in the Frontend and Backend

Integrating Keycloak Identity Management in the Frontend and Backend

9
Comments
4 min read
How to Invalidate JWT Tokens Without Collecting Tokens

How to Invalidate JWT Tokens Without Collecting Tokens

104
Comments 29
3 min read
How to use Laravel Session

How to use Laravel Session

14
Comments
3 min read
Rendering Web Methods in Next.js

Rendering Web Methods in Next.js

3
Comments
2 min read
Verifying data integrity with KMS asymmetric keys

Verifying data integrity with KMS asymmetric keys

6
Comments
8 min read
How to Define, Measure, Analyze and Predict Customer Churn

How to Define, Measure, Analyze and Predict Customer Churn

1
Comments
9 min read
Microsoft Defender for DevOps (Preview)

Microsoft Defender for DevOps (Preview)

2
Comments
6 min read
9 Things to Consider When Choosing an SCA Tool

9 Things to Consider When Choosing an SCA Tool

3
Comments 1
7 min read
Like react-query and redux? You'll love RTK Query

Like react-query and redux? You'll love RTK Query

7
Comments
4 min read
Roles and Permissions in Plain English

Roles and Permissions in Plain English

5
Comments
5 min read
Ruby on Rails Security: 8 Best Practices

Ruby on Rails Security: 8 Best Practices

Comments
6 min read
Unit Testing of React Apps using JEST.

Unit Testing of React Apps using JEST.

4
Comments
7 min read
Public Key Cryptography: Hash Message, Sign Message, Recover Public Key, and Public Key Address

Public Key Cryptography: Hash Message, Sign Message, Recover Public Key, and Public Key Address

16
Comments 7
5 min read
Simulate a Mouse Click Using JavaScript

Simulate a Mouse Click Using JavaScript

11
Comments 1
2 min read
loading...