DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Common OAuth2 Misconceptions: Debunking Myths for a Secure Implementation

Comments
3 min read
OAuth2: Understanding the Client Credentials Grant Type

OAuth2: Understanding the Client Credentials Grant Type

1
Comments
2 min read
Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Safeguarding Your Data with AWS S3 Pre-Signed URLs: A Comprehensive Guide

Comments
2 min read
RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

RFC 9068: The JWT Profile for OAuth2 Access Tokens — A Standard for Seamless Integration

Comments
3 min read
Access Token or ID Token? Which to Use and Why?

Access Token or ID Token? Which to Use and Why?

Comments
3 min read
Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Embracing Zero Trust Architecture: A Paradigm Shift in Cybersecurity

Comments
3 min read
OAuth2: Understanding the Authorization Code Grant Type

OAuth2: Understanding the Authorization Code Grant Type

Comments
3 min read
OAuth2 Demystified: An Introduction to Secure Authorization

OAuth2 Demystified: An Introduction to Secure Authorization

Comments
3 min read
JSON Web Tokens (JWTs): A Comprehensive Guide

JSON Web Tokens (JWTs): A Comprehensive Guide

Comments
3 min read
Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Agile + DevOpsDays Des Moines 2024: Finding A Common Path With Empathy, Automation, And Security

Comments
8 min read
Understanding the Differences Between Authentication and Authorization

Understanding the Differences Between Authentication and Authorization

Comments
2 min read
What does CORS really do? 🤔

What does CORS really do? 🤔

1
Comments
3 min read
CISSP Certification: The Gold Standard for Cybersecurity Professionals

CISSP Certification: The Gold Standard for Cybersecurity Professionals

1
Comments 1
2 min read
How to Use ENV variables in GitHub Actions

How to Use ENV variables in GitHub Actions

6
Comments
3 min read
Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Implementing Secure and Highly Available Storage Solutions for Company Data and Website Backup

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.