DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
A primer on open-source intelligence for bug bounty hunting in Grafana

A primer on open-source intelligence for bug bounty hunting in Grafana

5
Comments
10 min read
Securing Your Application with HTTP Basic Authentication in Nginx

Securing Your Application with HTTP Basic Authentication in Nginx

Comments
2 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

Comments 2
2 min read
Security news weekly round-up - 21st June 2024

Security news weekly round-up - 21st June 2024

Comments
2 min read
Securing your machine identities means better secrets management

Securing your machine identities means better secrets management

1
Comments
8 min read
OAuth 2.1 is Here: What You Need to Know

OAuth 2.1 is Here: What You Need to Know

17
Comments
6 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

21
Comments 1
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

7
Comments 1
3 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
.NET 8.0 - Securing the API with JWT Bearer Token

.NET 8.0 - Securing the API with JWT Bearer Token

159
Comments 1
5 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

6
Comments 2
4 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

26
Comments 2
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.