DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Top 10 Tips with Code Examples: C# Application Security

Top 10 Tips with Code Examples: C# Application Security

12
Comments 1
8 min read
Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Safeguarding Your Users: A Simple Guide to Preventing CSRF Attacks

Comments
5 min read
5 AI-Powered Content Detectors to Help Identify AI-Generated Text

5 AI-Powered Content Detectors to Help Identify AI-Generated Text

2
Comments
5 min read
What happens when a user tries to access a resource in AWS ?

What happens when a user tries to access a resource in AWS ?

Comments
1 min read
Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

Understanding SDLC, CICD And Tools Involved - Specially Focus on Application Security

1
Comments
7 min read
API7 Enterprise v3.2.16: Integrated Secret Providers

API7 Enterprise v3.2.16: Integrated Secret Providers

1
Comments
3 min read
Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

Ultimate Guide to Authentication and Authorization: Best Practices for Secure Applications

2
Comments 1
5 min read
Reverse engineering TP-Link Tapo's REST API - part 1

Reverse engineering TP-Link Tapo's REST API - part 1

21
Comments 5
10 min read
Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Tether & USDC: The Backbone of 2024's Stablecoin Surge Amid Security Concerns

Comments
4 min read
Dockerfile Best Practices: Writing Efficient and Secure Docker Images

Dockerfile Best Practices: Writing Efficient and Secure Docker Images

50
Comments 4
4 min read
BotKube: Integrando o agente de monitoramento com o Slack

BotKube: Integrando o agente de monitoramento com o Slack

4
Comments
2 min read
Create a self-signed certificate with your own root CA

Create a self-signed certificate with your own root CA

1
Comments
2 min read
ImplementaciĂłn de AutenticaciĂłn Segura en Node.js con JWT

ImplementaciĂłn de AutenticaciĂłn Segura en Node.js con JWT

2
Comments
4 min read
Introduction to Minder

Introduction to Minder

2
Comments
2 min read
E-commerce website vulnerability bounty practice sharingI

E-commerce website vulnerability bounty practice sharingI

Comments
2 min read
Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Strengthening Security and Compliance in AWS Cloud Services & The Essential Role of AI Verification.

Comments
4 min read
Identity and Access Management (IAM) on AWS

Identity and Access Management (IAM) on AWS

Comments
3 min read
Issue 65 of AWS Cloud Security Weekly

Issue 65 of AWS Cloud Security Weekly

1
Comments
2 min read
Top 11 CI/CD Tools for 2024

Top 11 CI/CD Tools for 2024

10
Comments
7 min read
Building a Simple Python-Based Firewall for Home Networks

Building a Simple Python-Based Firewall for Home Networks

7
Comments
2 min read
Guia super Resumido do PCI-DSS

Guia super Resumido do PCI-DSS

1
Comments
6 min read
Wednesday Links - Edition 2024-09-04

Wednesday Links - Edition 2024-09-04

Comments
1 min read
How will NIS2 affect European Industries

How will NIS2 affect European Industries

Comments
8 min read
CĂłdigo seguro com OWASP e SSDLC - 3 OWASP API Security Top 10

CĂłdigo seguro com OWASP e SSDLC - 3 OWASP API Security Top 10

2
Comments
6 min read
Open Source Tool List for Web App Security

Open Source Tool List for Web App Security

1
Comments
4 min read
loading...