DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

6
Comments 5
4 min read
How to Defend Against Bot Attacks with SafeLine WAF

How to Defend Against Bot Attacks with SafeLine WAF

5
Comments
2 min read
mKingdom Tryhackme Writeup

mKingdom Tryhackme Writeup

Comments
6 min read
The Importance of Cybersecurity in Today's Digital Landscape 🔒

The Importance of Cybersecurity in Today's Digital Landscape 🔒

Comments
2 min read
"The Quest for Cloud Security and Compliance: A CSPM Story"

"The Quest for Cloud Security and Compliance: A CSPM Story"

1
Comments
3 min read
I Created a VSCode Extension to Warn Against Vulnerable MongoDB Queries

I Created a VSCode Extension to Warn Against Vulnerable MongoDB Queries

Comments
1 min read
𝗧𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝗽𝗽𝘀: 𝗔𝗜-𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗔𝗴𝗲𝗻𝘁𝘀, "𝗩𝗶𝗯𝗲-𝗖𝗼𝗱𝗶𝗻𝗴" 𝗜𝗻𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗼𝗿 "𝗦𝗶𝗻𝗴𝗹𝗲-𝗜𝗻𝗽𝘂𝘁" 𝗜𝗻𝘁𝗲𝗿𝗳𝗮𝗰𝗲𝘀?

𝗧𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝗽𝗽𝘀: 𝗔𝗜-𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗔𝗴𝗲𝗻𝘁𝘀, "𝗩𝗶𝗯𝗲-𝗖𝗼𝗱𝗶𝗻𝗴" 𝗜𝗻𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗼𝗿 "𝗦𝗶𝗻𝗴𝗹𝗲-𝗜𝗻𝗽𝘂𝘁" 𝗜𝗻𝘁𝗲𝗿𝗳𝗮𝗰𝗲𝘀?

15
Comments
2 min read
A Safer Container Runtime

A Safer Container Runtime

Comments
4 min read
Revolutionize Your Secret Management with Infisical: The Open-Source Solution You've Been Waiting For!

Revolutionize Your Secret Management with Infisical: The Open-Source Solution You've Been Waiting For!

Comments
3 min read
Cloud vs. On-Prem Storage: The Hidden Costs No One Talks About

Cloud vs. On-Prem Storage: The Hidden Costs No One Talks About

3
Comments
3 min read
New Next.js Middleware Vulnerability – How Bad Is It?

New Next.js Middleware Vulnerability – How Bad Is It?

5
Comments
2 min read
Adding Permissions in your application

Adding Permissions in your application

Comments
1 min read
Securing My AWS EC2: A Journey Through IAM and SSH Struggles

Securing My AWS EC2: A Journey Through IAM and SSH Struggles

Comments
3 min read
The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats

The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats

Comments
3 min read
Automating secure CloudWatch Alarms with CDK Monitoring Constructs and encrypted SNS

Automating secure CloudWatch Alarms with CDK Monitoring Constructs and encrypted SNS

4
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.