DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Compliance of data solutions based on InterSystems technology with GDPR (Europe), CCPA (California) and LGPD (Brazil)

Compliance of data solutions based on InterSystems technology with GDPR (Europe), CCPA (California) and LGPD (Brazil)

3
Comments
6 min read
How to use SSL in PostgreSQL The Right Way: Encrypt Your Data in Transit

How to use SSL in PostgreSQL The Right Way: Encrypt Your Data in Transit

5
Comments
1 min read
[DevSecOps] #3 Prometheus,Grafanaを使用したサーバ監視基盤の構築手順

[DevSecOps] #3 Prometheus,Grafanaを使用したサーバ監視基盤の構築手順

6
Comments
3 min read
[DevSecOps] #4 Prometheus + MongoDB監視導入手順

[DevSecOps] #4 Prometheus + MongoDB監視導入手順

5
Comments
2 min read
OAuth 2.0 - Before You Start: Pick the Right Flow for Your Website, SPA, Mobile App, TV App, and CLI

OAuth 2.0 - Before You Start: Pick the Right Flow for Your Website, SPA, Mobile App, TV App, and CLI

68
Comments
8 min read
[DevSecOps] #2 まず見える化する

[DevSecOps] #2 まず見える化する

5
Comments
1 min read
[DevSecOps] #1 ビジネスを加速する文化的処方箋

[DevSecOps] #1 ビジネスを加速する文化的処方箋

4
Comments
1 min read
YANMSS (Yet Another New Mac Setup Script)!

YANMSS (Yet Another New Mac Setup Script)!

7
Comments
4 min read
Automatically upgrade security vulnerabilities with this Yarn audit fix alternative

Automatically upgrade security vulnerabilities with this Yarn audit fix alternative

6
Comments 1
2 min read
HMAC and MACs – The Inner Workings of JWTs

HMAC and MACs – The Inner Workings of JWTs

7
Comments
4 min read
Introduction to Kerberos

Introduction to Kerberos

10
Comments 1
5 min read
We Can’t Talk About Privacy Without Developers

We Can’t Talk About Privacy Without Developers

7
Comments 2
10 min read
Weird Unicode Behaviors

Weird Unicode Behaviors

7
Comments
2 min read
Lodash: Understanding the recent vulnerability and how we can rally behind packages

Lodash: Understanding the recent vulnerability and how we can rally behind packages

11
Comments
8 min read
PHP and Composer lovers, this if for you

PHP and Composer lovers, this if for you

5
Comments
1 min read
Outsource Application Security: Should You Consider It?

Outsource Application Security: Should You Consider It?

6
Comments 1
4 min read
A Brief Introduction to Securing Applications with JWT

A Brief Introduction to Securing Applications with JWT

48
Comments 6
7 min read
Splunk: AWS CloudWatch Log Ingestion - Part 2 - Splunk Add-On for AWS

Splunk: AWS CloudWatch Log Ingestion - Part 2 - Splunk Add-On for AWS

5
Comments
10 min read
The EU Court of Justice invalidated the EU-US Data Protection Shield decision. Why is this important?

The EU Court of Justice invalidated the EU-US Data Protection Shield decision. Why is this important?

6
Comments 2
2 min read
Deep Dive into Container Security Scanning

Deep Dive into Container Security Scanning

1
Comments
1 min read
How to encrypt strings & files in your source code?

How to encrypt strings & files in your source code?

145
Comments 16
5 min read
Why Twitter’s Hack Isn’t About Twitter or Bitcoin: It’s About Our Identity on the Internet

Why Twitter’s Hack Isn’t About Twitter or Bitcoin: It’s About Our Identity on the Internet

6
Comments
4 min read
Pwnd Password Checking on the Edge

Pwnd Password Checking on the Edge

7
Comments
6 min read
CTF.live - Secret in Claim

CTF.live - Secret in Claim

2
Comments
3 min read
Dica Rápida: Protegendo senhas com BCrypt.Net

Dica Rápida: Protegendo senhas com BCrypt.Net

34
Comments 2
3 min read
loading...