DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Safe and Secure Software - MISRA C:2012

Safe and Secure Software - MISRA C:2012

Comments 1
12 min read
SREday SF 2025: Human Centered SRE In An AI World

SREday SF 2025: Human Centered SRE In An AI World

Comments
7 min read
Authentication vs Authorization (Explained in the Simplest Way Possible)

Authentication vs Authorization (Explained in the Simplest Way Possible)

4
Comments 2
2 min read
Building Real Privacy: Secure Data Transmission Without Servers

Building Real Privacy: Secure Data Transmission Without Servers

Comments
2 min read
AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

4
Comments
2 min read
requestPermissionsFromUser() does not work or directly returns without asking the user.

requestPermissionsFromUser() does not work or directly returns without asking the user.

1
Comments
1 min read
5 Security Vulnerabilities Every Developer Must Fix Today

5 Security Vulnerabilities Every Developer Must Fix Today

Comments
3 min read
🔒 Protect Sensitive Data in Uniface 10.4 with Pathscrambler

🔒 Protect Sensitive Data in Uniface 10.4 with Pathscrambler

Comments
2 min read
From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

Comments 1
5 min read
Run non-rooted commands

Run non-rooted commands

1
Comments
1 min read
JWT Authentication Explained: Access vs Refresh Tokens

JWT Authentication Explained: Access vs Refresh Tokens

Comments
4 min read
🔐 How to Change Your Password in Uniface 10.4: A Simple Guide

🔐 How to Change Your Password in Uniface 10.4: A Simple Guide

Comments
3 min read
Securing Your Uniface Applications with PathScrambler 🔐

Securing Your Uniface Applications with PathScrambler 🔐

Comments
4 min read
Day 13: Security Best Practices – Locking Down Your PostgreSQL Data

Day 13: Security Best Practices – Locking Down Your PostgreSQL Data

Comments
10 min read
From Frustration to Protection: The Logic of Secure Coding

From Frustration to Protection: The Logic of Secure Coding

1
Comments
2 min read
Cara Mendeteksi Device Unik Pengguna di Browser dengan FingerprintJS

Cara Mendeteksi Device Unik Pengguna di Browser dengan FingerprintJS

Comments
2 min read
The 3 Most Subtle Solidity Bugs We Found in Audits (And How We Found Them)

The 3 Most Subtle Solidity Bugs We Found in Audits (And How We Found Them)

Comments
6 min read
Media types (MIME types) in HTTP explained

Media types (MIME types) in HTTP explained

9
Comments
2 min read
Architecting Resilient Caching in Symfony: Beyond get() and set()

Architecting Resilient Caching in Symfony: Beyond get() and set()

6
Comments
8 min read
AWS Organizations: The Hidden Backbone of Enterprise Security

AWS Organizations: The Hidden Backbone of Enterprise Security

8
Comments
3 min read
PyKryptor - open source AxCrypt alternative

PyKryptor - open source AxCrypt alternative

Comments
2 min read
After Asana's AI Breach: What It Takes to Deploy Production AI Agents Securely

After Asana's AI Breach: What It Takes to Deploy Production AI Agents Securely

1
Comments
5 min read
Hack a Windows System Using PowerShell

Hack a Windows System Using PowerShell

6
Comments 1
6 min read
The Case for OAuth

The Case for OAuth

Comments
6 min read
Setup Hashicorp Vault + Vault Agent on Docker Compose

Setup Hashicorp Vault + Vault Agent on Docker Compose

8
Comments 2
5 min read
loading...