DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
6 Must-Have Features of an API Gateway

6 Must-Have Features of an API Gateway

Comments
10 min read
10 Best Practices for API Rate Limiting in 2025

10 Best Practices for API Rate Limiting in 2025

Comments
15 min read
How to Increase API Performance

How to Increase API Performance

Comments
12 min read
RBAC Analytics: Key Metrics to Monitor

RBAC Analytics: Key Metrics to Monitor

Comments
5 min read
Top 7 API Authentication Methods Compared

Top 7 API Authentication Methods Compared

Comments
14 min read
The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

The Critical Role of CISOs in Managing IAM - Including Non-Human Identities

Comments
9 min read
Kubernetes Security: Protecting Your Cluster Like Fort Knox 🔐

Kubernetes Security: Protecting Your Cluster Like Fort Knox 🔐

Comments
3 min read
The Cybersecurity Risks of AI-Generated Code: What You Need to Know

The Cybersecurity Risks of AI-Generated Code: What You Need to Know

6
Comments
3 min read
How to Secure Your Web App with JWT, OAuth, and Role-Based Access Control

How to Secure Your Web App with JWT, OAuth, and Role-Based Access Control

Comments
3 min read
Security Protocols

Security Protocols

Comments
1 min read
Top 5 Cloud Storage Security Risks (and How to Avoid Them)

Top 5 Cloud Storage Security Risks (and How to Avoid Them)

Comments
12 min read
ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes

ConfigMaps vs Secrets: Secure Configuration Management in Kubernetes

Comments
3 min read
Secure Terraform AWSCC provider resources with Guard Hooks

Secure Terraform AWSCC provider resources with Guard Hooks

Comments
5 min read
Novel Optimization Algorithms: From Entertainment to Military Applications

Novel Optimization Algorithms: From Entertainment to Military Applications

Comments
1 min read
"KQL Showdown: distinct vs project"

"KQL Showdown: distinct vs project"

Comments
1 min read
Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

Understanding and Preventing XSS Attacks: A Frontend Developer’s Guide

1
Comments
3 min read
How to break stream ciphers with repeating keystreams

How to break stream ciphers with repeating keystreams

Comments
2 min read
Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Network Security Explained: HTTPS, TLS, SSL, and Encryption 🔐

Comments
1 min read
Best Practices for Storing and Securing Passwords: A Developer's Guide

Best Practices for Storing and Securing Passwords: A Developer's Guide

Comments
5 min read
GDPR Compliant Logging in NestJS: Masking User Data in Real Time

GDPR Compliant Logging in NestJS: Masking User Data in Real Time

1
Comments
5 min read
Security news weekly round-up - 14th February 2025

Security news weekly round-up - 14th February 2025

1
Comments
4 min read
Non-Human Identity Security in the Age of AI

Non-Human Identity Security in the Age of AI

Comments
7 min read
Running Ollama in a Container Without Internet Access

Running Ollama in a Container Without Internet Access

Comments
3 min read
Data Validation and Sanitization in WordPress

Data Validation and Sanitization in WordPress

Comments
5 min read
How JWT, JWS, and JWE Secure Your Data?

How JWT, JWS, and JWE Secure Your Data?

1
Comments
4 min read
loading...