DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ten Ways to Secure your Applications

Ten Ways to Secure your Applications

63
Comments 2
9 min read
Dev Chats: Security Careers and Leadership with Alex Graul

Dev Chats: Security Careers and Leadership with Alex Graul

6
Comments
5 min read
Pragmatic Privacy for Programmers (Part 2)

Pragmatic Privacy for Programmers (Part 2)

6
Comments
11 min read
Add Social Login to Secure Your JHipster App

Add Social Login to Secure Your JHipster App

6
Comments
11 min read
Protecting sensitive data using Secret Manager in .Net Core

Protecting sensitive data using Secret Manager in .Net Core

18
Comments 1
1 min read
Serverless Days Hamburg 2019 - Day 2

Serverless Days Hamburg 2019 - Day 2

10
Comments
7 min read
Automated SSL on our Internal Applications

Automated SSL on our Internal Applications

11
Comments
4 min read
Serverless Days Hamburg 2019 - Day 1

Serverless Days Hamburg 2019 - Day 1

11
Comments
4 min read
Practical Binary Analysis Book Review

Practical Binary Analysis Book Review

4
Comments
1 min read
Keygenme or Not

Keygenme or Not

8
Comments
3 min read
Clickjacking on Google CSE. Is this Important?

Clickjacking on Google CSE. Is this Important?

6
Comments 3
2 min read
Python for Reverse Engineering #1: ELF Binaries

Python for Reverse Engineering #1: ELF Binaries

73
Comments 4
6 min read
Awesome .NET Security

Awesome .NET Security

51
Comments 4
1 min read
Fraud Detection with Ruby on Rails

Fraud Detection with Ruby on Rails

9
Comments
5 min read
Hacking Dev 2: Slipping through security

Hacking Dev 2: Slipping through security

41
Comments
4 min read
Be careful of the JWT hype train

Be careful of the JWT hype train

214
Comments 52
5 min read
Protecting Your React.js Source Code with Jscrambler

Protecting Your React.js Source Code with Jscrambler

15
Comments 2
6 min read
What I’ve learned from the Web Application Security Beginner’s Guide

What I’ve learned from the Web Application Security Beginner’s Guide

25
Comments
3 min read
Static netcat .exe files

Static netcat .exe files

6
Comments
1 min read
Blog post: Static Analysis in Perl - or yet another policy

Blog post: Static Analysis in Perl - or yet another policy

7
Comments
2 min read
Safer web: why does brute-force protection of login endpoints so important?

Safer web: why does brute-force protection of login endpoints so important?

15
Comments 3
3 min read
Securing IoT devices connections with blockchain: does it make sense?

Securing IoT devices connections with blockchain: does it make sense?

8
Comments 6
2 min read
FaceTime Vulnerability Allows Unauthorized Access to iPhone Mic

FaceTime Vulnerability Allows Unauthorized Access to iPhone Mic

33
Comments 4
1 min read
Swiss Army knife for Unix permissions

Swiss Army knife for Unix permissions

6
Comments 5
1 min read
the infosec mindset

the infosec mindset

11
Comments
3 min read
loading...