DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
If You Can't Control Access, You Can't Control the Cloud (Part 1)

If You Can't Control Access, You Can't Control the Cloud (Part 1)

3
Comments 1
6 min read
Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

Forget Complex Algorithms: The One, One-and-Two, Multiple Pass Solution is Here!

19
Comments
3 min read
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Comments
3 min read
Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

1
Comments
13 min read
User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

6
Comments
5 min read
Understanding XSRF Protection: Implementation in Fetch vs. Axios

Understanding XSRF Protection: Implementation in Fetch vs. Axios

5
Comments 2
7 min read
Why do we need OAuth ?

Why do we need OAuth ?

7
Comments
2 min read
SSO vs OAuth – Understand the Key Difference

SSO vs OAuth – Understand the Key Difference

5
Comments 1
2 min read
Beware the Global Const

Beware the Global Const

1
Comments 5
5 min read
Snyk and Sonar : committed credentials security test

Snyk and Sonar : committed credentials security test

3
Comments
6 min read
Rethinking AI in Security

Rethinking AI in Security

Comments
5 min read
Connecting to a Private RDS Instance via an EC2 Proxy

Connecting to a Private RDS Instance via an EC2 Proxy

7
Comments
2 min read
The Password Graveyard

The Password Graveyard

4
Comments
4 min read
Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

10
Comments 2
3 min read
How to Automate IAM Best Practices in CI/CD with IAM Access Analyzer

How to Automate IAM Best Practices in CI/CD with IAM Access Analyzer

18
Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.