DEV Community

Security

Hopefully not just an afterthought!

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
SSO Gone Wrong: Insights from a Real Breach

SSO Gone Wrong: Insights from a Real Breach

2
Comments
4 min read
๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

๐—ง๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—•๐—ฒ๐—ฎ๐—ฟ๐—ฒ๐—ฟ ๐—ง๐—ผ๐—ธ๐—ฒ๐—ป: ๐—ฆ๐—ถ๐—บ๐—ฝ๐—น๐—ถ๐—ณ๐˜†๐—ถ๐—ป๐—ด ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—”๐—ฃ๐—œ ๐—–๐—ผ๐—บ๐—บ๐˜‚๐—ป๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐Ÿš€

Comments
1 min read
Basic authentication in Spring Boot

Basic authentication in Spring Boot

Comments
4 min read
Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Ensuring Successful Passkey Deployment: Testing Strategies for Enterprises

Comments
2 min read
Avoiding Production Disasters with npm ci: The Key to Stable Deployments

Avoiding Production Disasters with npm ci: The Key to Stable Deployments

7
Comments 1
3 min read
Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

Here's how to brew obfuscation in JavaScript without burning the lab: AST, Babel, plugins.

2
Comments
16 min read
Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Understanding JWT: The Backbone of Modern Web Authentication and Authorization

Comments
2 min read
Code Reviews with AI: a Developer Guide

Code Reviews with AI: a Developer Guide

5
Comments 3
10 min read
What is Zero Trust Security?

What is Zero Trust Security?

10
Comments 2
2 min read
Implementing passwordless sign-in flow with text messages in Cognito

Implementing passwordless sign-in flow with text messages in Cognito

Comments
6 min read
Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
Securing AWS Environments with Advanced IAM & Zero Trust

Securing AWS Environments with Advanced IAM & Zero Trust

5
Comments
4 min read
Security as the foundation of digital sovereignty

Security as the foundation of digital sovereignty

Comments
4 min read
A Novel Approach for Text Encryption Using Tokenizers in Ruby

A Novel Approach for Text Encryption Using Tokenizers in Ruby

8
Comments
7 min read
The Counter Mode - manually!

The Counter Mode - manually!

Comments
7 min read
๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.