DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Implementing AWS SSO Integration with Jenkins

Implementing AWS SSO Integration with Jenkins

15
Comments
4 min read
Strengthening Enterprise Security: Key Strategies and Best Practices

Strengthening Enterprise Security: Key Strategies and Best Practices

Comments
2 min read
Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Secure Coding Practices for TEE Applications: A Guide for CA and TA Developers

Comments
1 min read
Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help

Comments
35 min read
Leveraging AWS WAF to Defend an Insecure Web App

Leveraging AWS WAF to Defend an Insecure Web App

1
Comments
4 min read
The Ultimate Guide to Two-Factor Authentication (2FA) on WordPress

The Ultimate Guide to Two-Factor Authentication (2FA) on WordPress

Comments
3 min read
🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

4
Comments
1 min read
Reverse Proxy vs. API Gateway vs. Load Balancer🌐

Reverse Proxy vs. API Gateway vs. Load Balancer🌐

5
Comments
2 min read
🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

🚀 Achieving High Availability with IBM WebSphere Application Server 🌐

5
Comments
1 min read
Securing React Applications with ReCAPTZ: A Complete Guide

Securing React Applications with ReCAPTZ: A Complete Guide

Comments
3 min read
Building a Secure API: A Beginner-Friendly Guide with Express and TypeScript

Building a Secure API: A Beginner-Friendly Guide with Express and TypeScript

6
Comments 4
4 min read
Protect your Website with SafeLine WAF

Protect your Website with SafeLine WAF

6
Comments
6 min read
What is an Incident Response Plan and Why It Matters

What is an Incident Response Plan and Why It Matters

1
Comments
1 min read
Common Online Scams and How to Avoid Them

Common Online Scams and How to Avoid Them

1
Comments 2
5 min read
Spring Security Part 2 : Getting started with jdbc authentication

Spring Security Part 2 : Getting started with jdbc authentication

2
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.