DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Reverse Methods for Obtaining Phone Numbers and Preventive Measures

Reverse Methods for Obtaining Phone Numbers and Preventive Measures

2
Comments
3 min read
Meaning of passwordless authentication for beginners (and let's make it)

Meaning of passwordless authentication for beginners (and let's make it)

2
Comments
3 min read
Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Why I Built an Open-Source Kit to Help Demystify OWASP ASVS Compliance

Comments
2 min read
AWS Organizations Best Practices: The Critical Configurations Most Teams Miss

AWS Organizations Best Practices: The Critical Configurations Most Teams Miss

2
Comments
11 min read
What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial

What I Learned Building Three Simple Projects: AnimalSounds, CheeseMath, and a Node.js Secrets Tutorial

Comments
2 min read
Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Securing AWS Credentials with Secrets Manager after Sanitizing Git History

Comments
6 min read
Secrets in .NET: Why Strings Are Not Safe (and What to Do Instead)

Secrets in .NET: Why Strings Are Not Safe (and What to Do Instead)

3
Comments 1
8 min read
Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

Session: Deconstructing the Future of Private Messaging - Is This Truly the Most Secure Messenger?

1
Comments
5 min read
Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

Build a Smart Object Detection Alarm with Arduino & HC-SR04 Sensor – Full Tutorial

1
Comments
2 min read
Top Security Threats in Blockchain

Top Security Threats in Blockchain

1
Comments
6 min read
Docker Registry (Harbor) and Private Repositories

Docker Registry (Harbor) and Private Repositories

1
Comments
5 min read
Demystifying OAuth2 APIs: A Comprehensive Guide

Demystifying OAuth2 APIs: A Comprehensive Guide

Comments
1 min read
OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

OWASP Top 10 2025 What You Need To Know as a Security Engineer or Hacker

2
Comments
2 min read
From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

From Post to Pwned: How Stored Cross-Site Scripting (Stored XSS) Can Lead to Account Takeover

Comments
3 min read
🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

🚀 ทำความเข้าใจ Row-Level Security (RLS) ใน PostgreSQL แบบง่ายที่สุด

Comments
1 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.