DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

Understanding Modern Web Authentication Flows: Session vs JWT vs OAuth

1
Comments
4 min read
APIs and Security Best Practices: JavaScript and Python Examples

APIs and Security Best Practices: JavaScript and Python Examples

1
Comments 1
5 min read
Essential SQL Database Security Practices to Protect Your Data

Essential SQL Database Security Practices to Protect Your Data

Comments
4 min read
How To Find Zombie Hosts With Nmap?

How To Find Zombie Hosts With Nmap?

Comments
2 min read
5 Reasons Why IT Security Tools Fall Short To Secure the Industry

5 Reasons Why IT Security Tools Fall Short To Secure the Industry

Comments 1
4 min read
Access Microsoft 365 resources from custom on premise application - setup

Access Microsoft 365 resources from custom on premise application - setup

2
Comments 1
9 min read
AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

AWS Certificate Manager to Shift Trust Anchor, Ending Cross-Signature with Starfield Class 2 Root

3
Comments
2 min read
Kubernetes Service Accounts: Guide

Kubernetes Service Accounts: Guide

8
Comments 1
10 min read
Understanding Namespaces in Kubernetes

Understanding Namespaces in Kubernetes

6
Comments
6 min read
Kubernetes Network Policies

Kubernetes Network Policies

5
Comments
6 min read
Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Protecting Your Digital Life: A Simple Guide to Mobile App Security for Everyday Users and Small Business Owners

Comments
13 min read
AWS Security Group vs NACL: What’s the Difference?

AWS Security Group vs NACL: What’s the Difference?

5
Comments
2 min read
I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users

46
Comments 5
7 min read
Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Forward vs Reverse Proxies: Understanding Their Role in Network Architecture

Comments
3 min read
Horizontal privilege escalation

Horizontal privilege escalation

1
Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.