DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS Cognito - IAM in the Cloud

AWS Cognito - IAM in the Cloud

Comments
3 min read
Beyond JWT: Unlocking PASETO for Secure Token Management

Beyond JWT: Unlocking PASETO for Secure Token Management

3
Comments
7 min read
Scenario based practices for securing an AWS S3 bucket.

Scenario based practices for securing an AWS S3 bucket.

7
Comments
2 min read
JavaScript app security audit

JavaScript app security audit

2
Comments
2 min read
Securing Your APIs: A Guide to Design Patterns for Robust Defense

Securing Your APIs: A Guide to Design Patterns for Robust Defense

Comments
3 min read
SSH Config for Multiple SSH Authentication

SSH Config for Multiple SSH Authentication

15
Comments
1 min read
Security news weekly round-up - 5th July 2024

Security news weekly round-up - 5th July 2024

Comments
3 min read
Implementing Secure Authentication in Next.js with JWT and MongoDB. Protect Routes using middleware

Implementing Secure Authentication in Next.js with JWT and MongoDB. Protect Routes using middleware

1
Comments
3 min read
Securing Generative AI Applications: A Comprehensive Approach

Securing Generative AI Applications: A Comprehensive Approach

Comments
4 min read
Data Consistency and Integrity in API Integration

Data Consistency and Integrity in API Integration

2
Comments
5 min read
A Simple Instagram Tracking Script Written in Python

A Simple Instagram Tracking Script Written in Python

5
Comments
2 min read
Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Upstream preview: Secure by design with Aeva Black and Jack Cable from CISA

Comments
3 min read
Protecting Sensitive Data using Ansible Vault

Protecting Sensitive Data using Ansible Vault

2
Comments
4 min read
๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

๐“๐ก๐ž ๐๐ฌ๐ฒ๐œ๐ก๐จ๐ฅ๐จ๐ ๐ฒ ๐จ๐Ÿ ๐’๐จ๐œ๐ข๐š๐ฅ ๐„๐ง๐ ๐ข๐ง๐ž๐ž๐ซ๐ข๐ง๐ : ๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ซ๐จ๐ญ๐ž๐œ๐ญ ๐˜๐จ๐ฎ๐ซ๐ฌ๐ž๐ฅ๐Ÿ ๐š๐ง๐ ๐˜๐จ๐ฎ๐ซ ๐ƒ๐š๐ญ๐š

5
Comments 7
1 min read
Safe and Secure Consumption of Open Source Libraries

Safe and Secure Consumption of Open Source Libraries

2
Comments
3 min read
๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.