DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

1
Comments
10 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
The Hack That Made People Rich.....in Subway Surfers

The Hack That Made People Rich.....in Subway Surfers

2
Comments 2
4 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

1
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

1
Comments
10 min read
How to Prevent SQL Injection

How to Prevent SQL Injection

1
Comments
2 min read
How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

Comments
1 min read
Azure DevOps Security Best Practices

Azure DevOps Security Best Practices

Comments
14 min read
Cloud Security vs Traditional Security: Key Differences

Cloud Security vs Traditional Security: Key Differences

Comments
4 min read
Mastering MySQL Security: Key Steps to Protect Your Database

Mastering MySQL Security: Key Steps to Protect Your Database

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.