DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

Preventing Secrets from Leaking in Code with Talisman and Git Hooks 🔐

1
Comments
1 min read
🔒 ProtĂ©gez votre site WordPress : SĂ©curitĂ© et Backup, les indispensables pour bien dĂ©buter 🔒

🔒 ProtĂ©gez votre site WordPress : SĂ©curitĂ© et Backup, les indispensables pour bien dĂ©buter 🔒

1
Comments
2 min read
BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

BUILDING A CYBERSECURITY DETECTION AND MONITORING LAB BY LEVERAGING LOCAL VIRTUAL MACHINES (VMs) AND MICROSOFT AZURE

1
Comments
43 min read
Security in the Cloud: Your Role in the Shared Responsibility Model

Security in the Cloud: Your Role in the Shared Responsibility Model

5
Comments
8 min read
Securing Your Spring Boot Application with Spring Security

Securing Your Spring Boot Application with Spring Security

2
Comments
4 min read
Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Implementing OAuth2 in Spring Boot: A Step-by-Step Guide

Comments
5 min read
OAuth2 Client Credentials Grant Type: When and How to Use It

OAuth2 Client Credentials Grant Type: When and How to Use It

Comments
4 min read
Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Securing REST APIs with OAuth2 and JWT: A Comprehensive Guide

Comments
4 min read
OAuth2 vs. OpenID Connect: Understanding the Differences

OAuth2 vs. OpenID Connect: Understanding the Differences

Comments
3 min read
Spring Security: Implementing JWT Authentication in Your Java Application

Spring Security: Implementing JWT Authentication in Your Java Application

Comments
4 min read
Why You Should Be Using a Password Manager

Why You Should Be Using a Password Manager

Comments
3 min read
Understanding VPNs: How They Work and Why You Need One

Understanding VPNs: How They Work and Why You Need One

Comments
4 min read
Passwordless Authentication

Passwordless Authentication

Comments
3 min read
Beware of Spring Boot Actuator Endpoint env: A Security Alert

Beware of Spring Boot Actuator Endpoint env: A Security Alert

1
Comments
3 min read
Understanding Multi-Factor Authentication: A Deep Dive into MFA

Understanding Multi-Factor Authentication: A Deep Dive into MFA

1
Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.