DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Staying Secure & Connected While Traveling

Staying Secure & Connected While Traveling

Comments
1 min read
HttpOnly Cookies: A Secure Solution for Sensitive Data

HttpOnly Cookies: A Secure Solution for Sensitive Data

Comments
3 min read
Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
Top 8 API Management Trends in 2025

Top 8 API Management Trends in 2025

7
Comments
8 min read
Guardius: Your DevOps and Security Companion

Guardius: Your DevOps and Security Companion

Comments
3 min read
Deploying smartcontracts through github actions using AWS secret manager

Deploying smartcontracts through github actions using AWS secret manager

Comments
4 min read
LTL and CTL Applications for Smart Contracts Security

LTL and CTL Applications for Smart Contracts Security

Comments
3 min read
Using SSH Authentication with GitHub

Using SSH Authentication with GitHub

1
Comments
2 min read
AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

Comments
4 min read
Security news weekly round-up - 31st January 2025

Security news weekly round-up - 31st January 2025

1
Comments
4 min read
DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

Comments
6 min read
One of the biggest bank heists in history

One of the biggest bank heists in history

Comments
1 min read
Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Comments
3 min read
Tutorial: Credit card cracking explained — and how to prevent it

Tutorial: Credit card cracking explained — and how to prevent it

Comments
12 min read
Computer Viruses in Practice: Self-Replication

Computer Viruses in Practice: Self-Replication

Comments
6 min read
CodeMash 2025: A Community Conversation About NHI And Secrets Security

CodeMash 2025: A Community Conversation About NHI And Secrets Security

Comments
7 min read
How to Set Up Two-Factor Authentication on WordPress Without Plugin

How to Set Up Two-Factor Authentication on WordPress Without Plugin

5
Comments
4 min read
Quick Cookie Management Tips

Quick Cookie Management Tips

Comments
3 min read
I built this free tool so IT teams can customize and streamline their employee offboarding

I built this free tool so IT teams can customize and streamline their employee offboarding

Comments
1 min read
Java, Taint, and SAST: What is it and why do we need it?

Java, Taint, and SAST: What is it and why do we need it?

Comments
8 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
Quantum Threat: Will Quantum Computers Break Crypto?

Quantum Threat: Will Quantum Computers Break Crypto?

Comments
4 min read
OpenTofu - Encrypted State + Git to Bootstrap Infrastructure

OpenTofu - Encrypted State + Git to Bootstrap Infrastructure

Comments
5 min read
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
loading...