DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CodeMash 2025: A Community Conversation About NHI And Secrets Security

CodeMash 2025: A Community Conversation About NHI And Secrets Security

Comments
7 min read
Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

Analisando Processos no Linux: Um Guia de Procedimentos Para o Dia a Dia

1
Comments
5 min read
Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Demystifying Social Logins: How OAuth2 Powers Seamless Authentication

Comments
5 min read
Token based Authentication using .NET Identity

Token based Authentication using .NET Identity

Comments
10 min read
Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

Hybrid Cloud or Multi Cloud: Which is a More Secure Option?

1
Comments
5 min read
How to Set Up Two-Factor Authentication on WordPress Without Plugin

How to Set Up Two-Factor Authentication on WordPress Without Plugin

5
Comments
4 min read
GCP Workload Identity - Kubernetes Federation

GCP Workload Identity - Kubernetes Federation

1
Comments
4 min read
Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Comments
3 min read
Difference between AWS Security Groups and NACL

Difference between AWS Security Groups and NACL

Comments
4 min read
Top Infrastructure as Code Security Tools in 2025

Top Infrastructure as Code Security Tools in 2025

Comments
8 min read
Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

8
Comments
3 min read
OWASP Dependency Check on Azure DevOps

OWASP Dependency Check on Azure DevOps

Comments
4 min read
OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

OAuth2 Resource Owner Password Credentials Grant Type: Use Cases and Security Risks

1
Comments
3 min read
Java, Taint, and SAST: What is it and why do we need it?

Java, Taint, and SAST: What is it and why do we need it?

Comments
8 min read
Some data breach just exposed 50 million students

Some data breach just exposed 50 million students

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.