DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Do Certificate Revocation Checking Mechanisms Never Work?

Why Do Certificate Revocation Checking Mechanisms Never Work?

2
Comments
18 min read
On .NET Episode: Securing Services with MSAL

On .NET Episode: Securing Services with MSAL

11
Comments
1 min read
A Field Guide to CoAP, Part 1

A Field Guide to CoAP, Part 1

5
Comments
8 min read
How to Integrate Security Into a DevOps Cycle

How to Integrate Security Into a DevOps Cycle

13
Comments
5 min read
Are you worried about Security at the Application Layer?

Are you worried about Security at the Application Layer?

9
Comments
4 min read
Approov Serverless Reverse Proxy in the AWS API Gateway

Approov Serverless Reverse Proxy in the AWS API Gateway

4
Comments
10 min read
How create a discipline routine for learn development!

How create a discipline routine for learn development!

3
Comments 1
1 min read
A Practical Guide to AWS IAM

A Practical Guide to AWS IAM

3
Comments 2
1 min read
Secure SDLC and Best Practices for Outsourcing

Secure SDLC and Best Practices for Outsourcing

7
Comments
6 min read
CodeQL Analysis on GitHub

CodeQL Analysis on GitHub

5
Comments
2 min read
Infrastructure as code leads to Security as code

Infrastructure as code leads to Security as code

11
Comments
5 min read
How to share a secret?

How to share a secret?

58
Comments
4 min read
Generating a Self Signed Certificate using Powershell

Generating a Self Signed Certificate using Powershell

9
Comments
1 min read
SPFx issues with the new Referrer-Policy in Chrome >= 85

SPFx issues with the new Referrer-Policy in Chrome >= 85

3
Comments
2 min read
All you need to know about TERMUX

All you need to know about TERMUX

24
Comments
2 min read
OAuth 2.0 Resources You Can Actually Understand

OAuth 2.0 Resources You Can Actually Understand

148
Comments 3
3 min read
Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

Web Vulnerabilities: Romantic Conversations of a Vulnerable Application Part 1

6
Comments 1
2 min read
How to Securely Access The Dark Web in 15 Steps. Second Part

How to Securely Access The Dark Web in 15 Steps. Second Part

8
Comments
9 min read
Scilla, information-gathering tool!

Scilla, information-gathering tool!

3
Comments 1
1 min read
Best Practices for Securing Your REST APIs

Best Practices for Securing Your REST APIs

102
Comments 3
4 min read
Why 2020 Will Be Online Education's Biggest Year

Why 2020 Will Be Online Education's Biggest Year

2
Comments 1
3 min read
5 tips to secure your backend application

5 tips to secure your backend application

8
Comments
3 min read
How to make your MongoDB container more secure?

How to make your MongoDB container more secure?

65
Comments 2
3 min read
How to Prevent Data Loss: 13 Simple Ways

How to Prevent Data Loss: 13 Simple Ways

37
Comments
7 min read
💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

💎💎💎🔏 Security Logs: Cryptographically Signed Audit Logging for Data Protection

9
Comments
3 min read
loading...