DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
IAM security: from fundamentals to advanced protection (Best practices 2025)

IAM security: from fundamentals to advanced protection (Best practices 2025)

1
Comments
5 min read
⚙️ Go Tools: Password Hashing with Argon2 Instead of bcrypt

⚙️ Go Tools: Password Hashing with Argon2 Instead of bcrypt

2
Comments
4 min read
How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

How I hid in the deafening noise. How to use DNS amplification vulnerability to hide your actions.

6
Comments 8
7 min read
I rolled my own auth

I rolled my own auth

4
Comments 2
1 min read
Laravel Vulnerability Scanner – Scan for CVEs, .env, SQLi, and More

Laravel Vulnerability Scanner – Scan for CVEs, .env, SQLi, and More

1
Comments
1 min read
SSH Authentication Key Rotation: Why and How to Expire SSH Keys

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

8
Comments
4 min read
The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

11
Comments 2
3 min read
Authenticate GitHub Actions to Azure using OpenID Connect

Authenticate GitHub Actions to Azure using OpenID Connect

1
Comments
4 min read
Secure Your Spring Boot API with JWT and Role-Based Authorization

Secure Your Spring Boot API with JWT and Role-Based Authorization

1
Comments
5 min read
Terraforming the Cloud

Terraforming the Cloud

16
Comments 13
2 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.