DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Creating a Private Endpoint for Azure Storage Account using Terraform

Creating a Private Endpoint for Azure Storage Account using Terraform

31
Comments 1
4 min read
A Beginner’s Guide to Authentication and Authorization in Rails

A Beginner’s Guide to Authentication and Authorization in Rails

1
Comments
10 min read
Two approaches to make your APIs more secure

Two approaches to make your APIs more secure

21
Comments 7
11 min read
Implementing item-level access control to DynamoDB tables

Implementing item-level access control to DynamoDB tables

3
Comments
9 min read
Vault Associate Certification (Part 2): Create Vault policies

Vault Associate Certification (Part 2): Create Vault policies

1
Comments
8 min read
Deploy Authorizer to Handle User Authentication on Koyeb

Deploy Authorizer to Handle User Authentication on Koyeb

Comments
8 min read
URI vs URL: The real difference between the two

URI vs URL: The real difference between the two

1
Comments
2 min read
ZenStack: The Complete Authorization Solution for Prisma Projects

ZenStack: The Complete Authorization Solution for Prisma Projects

34
Comments 2
8 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
Password strength detector with machine learning

Password strength detector with machine learning

6
Comments
2 min read
Exploring third-party services with webhooks

Exploring third-party services with webhooks

6
Comments
6 min read
Avoid Smart Contract Hacks with Fuzz Testing

Avoid Smart Contract Hacks with Fuzz Testing

6
Comments
6 min read
Navigating Security and Compliance

Navigating Security and Compliance

7
Comments 2
4 min read
For Devops necessary Tools and Technology

For Devops necessary Tools and Technology

1
Comments
2 min read
Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

Unveiling Permify ABAC: A New Dimension to Attribute-Based Access Control

11
Comments
12 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.