DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Database Security Made Simple: Essential Practices

Database Security Made Simple: Essential Practices

Comments
2 min read
Authentication and Authorization Best Practices

Authentication and Authorization Best Practices

Comments
3 min read
Oops, My Database Got Hacked

Oops, My Database Got Hacked

Comments
4 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Comments
3 min read
Introducing Fingerprinting API – Your All-in-One Bot Detection & Fraud Prevention Solution

Introducing Fingerprinting API – Your All-in-One Bot Detection & Fraud Prevention Solution

2
Comments
1 min read
How to Audit, Anonymize, and Secure Your Database in 2025

How to Audit, Anonymize, and Secure Your Database in 2025

Comments
1 min read
Tríade CIA e Sua Importância na Cibersegurança.

Tríade CIA e Sua Importância na Cibersegurança.

Comments
3 min read
Blockchain and Digital Signatures: A New Era of Security

Blockchain and Digital Signatures: A New Era of Security

Comments
2 min read
Stop Forcing Complex Passwords on the Web

Stop Forcing Complex Passwords on the Web

Comments
3 min read
Meet BeanoGuard – Your New Best Friend for Secure Passwords

Meet BeanoGuard – Your New Best Friend for Secure Passwords

1
Comments
2 min read
Preventing SQL, XML, and Prompt Injection Vulnerabilities in Python

Preventing SQL, XML, and Prompt Injection Vulnerabilities in Python

Comments
4 min read
AWS Certificate Manager (ACM): An In-Depth Overview

AWS Certificate Manager (ACM): An In-Depth Overview

Comments
6 min read
Why Should You Use a CDN to Boost Your Website Speed?

Why Should You Use a CDN to Boost Your Website Speed?

Comments
3 min read
Security news weekly round-up - 21st February 2025

Security news weekly round-up - 21st February 2025

Comments
4 min read
Beyond the Ridiculous Typos

Beyond the Ridiculous Typos

Comments
1 min read
NixOS. Managing secrets with sops-nix

NixOS. Managing secrets with sops-nix

Comments
3 min read
Centralizing AWS Root User Management: A Best Practice for Security and Compliance

Centralizing AWS Root User Management: A Best Practice for Security and Compliance

Comments
5 min read
Testing Azure AD-protected API

Testing Azure AD-protected API

Comments
3 min read
Understanding Access Tokens and Refresh Tokens in Authentication

Understanding Access Tokens and Refresh Tokens in Authentication

Comments
3 min read
【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

【Recognition】Excellent Security Researcher in January 2025 iiiiiinv

Comments
1 min read
Understanding SHA-256 and Merkle Root in Blockchain

Understanding SHA-256 and Merkle Root in Blockchain

Comments
9 min read
Is Hacking Possible? Security Vulnerabilities and Defense

Is Hacking Possible? Security Vulnerabilities and Defense

Comments
8 min read
Server Security: 5 Essential Strategies to Fortify Your Infrastructure

Server Security: 5 Essential Strategies to Fortify Your Infrastructure

Comments
2 min read
Setting Up ClamAV for AWS - File Scan

Setting Up ClamAV for AWS - File Scan

Comments
2 min read
Why Your Business Needs Cloud Security Monitoring for Data Safety

Why Your Business Needs Cloud Security Monitoring for Data Safety

Comments
3 min read
loading...