DEV Community

Security

Hopefully not just an afterthought!

Posts

πŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Secure code review: Part 7 - Well-known attacks

Secure code review: Part 7 - Well-known attacks

5
Comments
3 min read
Setting up Auth Routes with Express

Setting up Auth Routes with Express

40
Comments
7 min read
What is a Web Application Firewall? Explained with Example

What is a Web Application Firewall? Explained with Example

7
Comments 1
1 min read
[DevSecOPS] #5 θ¦‹γˆγ‚‹εŒ–γ‚’θ‘Œγ£γŸγ‚‰(APァーバ編)

[DevSecOPS] #5 θ¦‹γˆγ‚‹εŒ–γ‚’θ‘Œγ£γŸγ‚‰(APァーバ編)

7
Comments
2 min read
Secure code review: Part 6 - Handling sensitive data

Secure code review: Part 6 - Handling sensitive data

8
Comments
3 min read
Creating and using AWS Secrets from the CLI and CDK

Creating and using AWS Secrets from the CLI and CDK

5
Comments
3 min read
Gitcoin + Chainlink: Bug Bounty Program

Gitcoin + Chainlink: Bug Bounty Program

3
Comments
2 min read
Security news weekly round-up - 14th August 2020

Security news weekly round-up - 14th August 2020

6
Comments
3 min read
πŸ”— Static IPs for AWS Lambdas

πŸ”— Static IPs for AWS Lambdas

8
Comments
3 min read
Secure code review: Part 5 - Least privilege principle

Secure code review: Part 5 - Least privilege principle

11
Comments
2 min read
Secure ASP.NET Blazor WASM apps and APIs with Azure AD B2C

Secure ASP.NET Blazor WASM apps and APIs with Azure AD B2C

14
Comments 25
10 min read
Engineering safer and more secure solutions for digital identity and access management with Rust

Engineering safer and more secure solutions for digital identity and access management with Rust

5
Comments
4 min read
Creating and using an SSH key pair on Windows

Creating and using an SSH key pair on Windows

2
Comments 1
4 min read
I Was Nominated Hacker Noon Contributor of the Year - SECURITY

I Was Nominated Hacker Noon Contributor of the Year - SECURITY

12
Comments
1 min read
Proxy in short

Proxy in short

7
Comments 3
2 min read
[SeguranΓ§a da InformaΓ§Γ£o] Ataques, conceitos e tΓ©cnicas

[SeguranΓ§a da InformaΓ§Γ£o] Ataques, conceitos e tΓ©cnicas

6
Comments
4 min read
Resolve NPM security vulnerabilities

Resolve NPM security vulnerabilities

6
Comments 2
2 min read
Secure code review: Part 4 - Enforce secure authentication

Secure code review: Part 4 - Enforce secure authentication

2
Comments
2 min read
Rainbow Tables & Why To Add Salt

Rainbow Tables & Why To Add Salt

11
Comments 1
4 min read
Protecting Your Apps From Link-based Vulnerabilities: Reverse Tabnabbing, Broken-Link Hijacking, and Open Redirects

Protecting Your Apps From Link-based Vulnerabilities: Reverse Tabnabbing, Broken-Link Hijacking, and Open Redirects

23
Comments
10 min read
Secure code review: Part 3 - Test for vulnerabilities introduced by dependencies

Secure code review: Part 3 - Test for vulnerabilities introduced by dependencies

4
Comments
2 min read
Creating an Authorization Plugin for Apollo Server

Creating an Authorization Plugin for Apollo Server

5
Comments
6 min read
Cookie-based Spring Security Session

Cookie-based Spring Security Session

5
Comments
1 min read
Secure code review: Part 2 - Never store secrets as code

Secure code review: Part 2 - Never store secrets as code

5
Comments
2 min read
AppAuth JS integration in React

AppAuth JS integration in React

12
Comments 6
5 min read
loading...