DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Securing Firebase Connections in Next.js with HTTPS

Securing Firebase Connections in Next.js with HTTPS

Comments
2 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

Opa Gatekeeper: How To Write Policies For Kubernetes Clusters

13
Comments 1
10 min read
Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

Building a Secure PDF Chat AI Application with Langchain, Next.js, arcjet, and Pinecone DB

9
Comments 1
6 min read
Top 10 Application Security Vulnerabilities in 2024

Top 10 Application Security Vulnerabilities in 2024

22
Comments
6 min read
Tokenization vs encryption

Tokenization vs encryption

1
Comments
4 min read
How to disable Spring Security for static resources

How to disable Spring Security for static resources

Comments
2 min read
Securing Data at Rest: The Importance of Encryption and How to Implement It

Securing Data at Rest: The Importance of Encryption and How to Implement It

Comments
3 min read
Code Smell 258 - Secrets in Code

Code Smell 258 - Secrets in Code

4
Comments
2 min read
Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

Enhance Code Security with GitHub Actions: Automatically Commenting PRs with Docker Scans

6
Comments
4 min read
The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

The Identity Puzzle: the Crucial Difference Between Access Tokens and ID Tokens

1
Comments
6 min read
Security in LLMs: Safeguarding AI Systems - V

Security in LLMs: Safeguarding AI Systems - V

Comments
7 min read
Webhooks vs. polling

Webhooks vs. polling

77
Comments 7
3 min read
Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Enhance Your Application Security with NMAP and OWASP ZAP: A Practical Guide

Comments
5 min read
SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

SECURING NETWORK TRAFFIC USING NETWORK SECURITY GROUP

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.