DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Should You Use A VPN?

Why Should You Use A VPN?

6
Comments
1 min read
Behavioral Biometrics - Next Stage Of eCommerce Customer Experience

Behavioral Biometrics - Next Stage Of eCommerce Customer Experience

4
Comments
4 min read
Verifying Google Chat request in NodeJS

Verifying Google Chat request in NodeJS

18
Comments 1
2 min read
Security best practices in IAM.. Summarized.

Security best practices in IAM.. Summarized.

5
Comments
7 min read
Make sure you know which Unicode version is supported by your programming language version

Make sure you know which Unicode version is supported by your programming language version

2
Comments
3 min read
How immutable data can benefit your data-driven application.

How immutable data can benefit your data-driven application.

15
Comments
2 min read
Keeping Yourself Safe Online

Keeping Yourself Safe Online

9
Comments 2
2 min read
These 7 PHP mistakes leave your website open to the hackers

These 7 PHP mistakes leave your website open to the hackers

33
Comments 6
4 min read
8 Biggest Website Security Mistakes Businesses Make

8 Biggest Website Security Mistakes Businesses Make

6
Comments
3 min read
Open edx SSO - Auth0

Open edx SSO - Auth0

2
Comments
3 min read
Cryptography and Ciphers explained

Cryptography and Ciphers explained

6
Comments
4 min read
Productionize multi AWS Accounts (org-formation Landing Zone)

Productionize multi AWS Accounts (org-formation Landing Zone)

9
Comments 2
3 min read
How serverless helps keep your WordPress site secure

How serverless helps keep your WordPress site secure

1
Comments
6 min read
My "hacking" bookmarks / tools

My "hacking" bookmarks / tools

10
Comments
5 min read
Linux Capabilities Use Cases - systemd

Linux Capabilities Use Cases - systemd

4
Comments
6 min read
Spring Security Architecture fundamentals

Spring Security Architecture fundamentals

4
Comments 2
4 min read
Five Common Cloud Security Threats and Data Breaches

Five Common Cloud Security Threats and Data Breaches

21
Comments 4
8 min read
Sigstore: A Solution to Software Supply Chain Security

Sigstore: A Solution to Software Supply Chain Security

10
Comments
6 min read
Balancing Clarity, Elegance, and Risk in Regular Expressions

Balancing Clarity, Elegance, and Risk in Regular Expressions

2
Comments
17 min read
Securely connecting to third party AWS accounts using cross account roles

Securely connecting to third party AWS accounts using cross account roles

11
Comments
5 min read
Creating Image Hash Collisions

Creating Image Hash Collisions

5
Comments
5 min read
The Easiest Way to Enable Tls 1.2 and Disable Cipher suits without troubles

The Easiest Way to Enable Tls 1.2 and Disable Cipher suits without troubles

1
Comments
3 min read
Git: scanning repositories for secrets using Gitleaks

Git: scanning repositories for secrets using Gitleaks

8
Comments
11 min read
Linux Capabilities Set and Bits

Linux Capabilities Set and Bits

10
Comments
4 min read
What is Apple thinking?

What is Apple thinking?

62
Comments 52
1 min read
loading...