DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐☁️Kancha’s Guide to AWS Infrastructure Protection: Securing the Cloud with Amazon Inspector

🔐☁️Kancha’s Guide to AWS Infrastructure Protection: Securing the Cloud with Amazon Inspector

Comments
2 min read
IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

IAM, CIAM, and IDaaS for Developers: Implementation Patterns and Practical Trade-offs

Comments 2
4 min read
How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow

How to Stay Safe from Cyber Attacks: Tips Anyone Can Follow

Comments
4 min read
Build Your Unshakeable AWS Cloud Security Career: The Practical Roadmap Employers Crave

Build Your Unshakeable AWS Cloud Security Career: The Practical Roadmap Employers Crave

Comments
2 min read
Serverless Security: Building Trust in the Cloud

Serverless Security: Building Trust in the Cloud

Comments
5 min read
Penetration Testing Firms: 10 Red Flags Every Business Should Know

Penetration Testing Firms: 10 Red Flags Every Business Should Know

1
Comments
22 min read
Zeroize: The Tiny and Memory-Safe Rust Crate

Zeroize: The Tiny and Memory-Safe Rust Crate

1
Comments
2 min read
Snowflake Architecture Series: A Foundational Checklist

Snowflake Architecture Series: A Foundational Checklist

Comments
11 min read
Your application should be PCI-DSS-compliant

Your application should be PCI-DSS-compliant

5
Comments
5 min read
Segurança com Zabbix

Segurança com Zabbix

Comments
2 min read
Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

Adding Passkey Login to My Open Source Project n1netails Using Yubico and WebAuthn

3
Comments
4 min read
The Ruby OAuth Collective

The Ruby OAuth Collective

6
Comments 2
1 min read
AWS Auth Caching Strategies

AWS Auth Caching Strategies

16
Comments 1
7 min read
Reference Architecture for Team AI Productivity

Reference Architecture for Team AI Productivity

5
Comments
9 min read
La cybersécurité et les mots de passe

La cybersécurité et les mots de passe

Comments
1 min read
How to Use NFC for Contactless Door Access (with Code Examples)

How to Use NFC for Contactless Door Access (with Code Examples)

Comments
4 min read
100DaysOfCode — Day 28

100DaysOfCode — Day 28

Comments
1 min read
Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

Android Penetration Testing Methodology: A Step-by-Step Guide to Securing Mobile Apps (Pt 1)

5
Comments
4 min read
How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

How We Solved Weak Cipher Issues in Our API Gateway Using CloudFront

3
Comments
3 min read
Preventing the Qantas Cyberattack: What Could Have Been Done Differently?

Preventing the Qantas Cyberattack: What Could Have Been Done Differently?

1
Comments
5 min read
Understanding Port 443: The Backbone of HTTPS Explained

Understanding Port 443: The Backbone of HTTPS Explained

Comments
5 min read
Sketching AI Security: Identity and Security Challenges in AI Development

Sketching AI Security: Identity and Security Challenges in AI Development

7
Comments 1
13 min read
วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

วิวัฒนาการของความปลอดภัยไซเบอร์: จาก ENIAC สู่ภัยคุกคามยุคใหม่

Comments 1
1 min read
SWIFT Sandbox Certificate failure during consuming SWIFT/ API from SWIFT/ SDK application

SWIFT Sandbox Certificate failure during consuming SWIFT/ API from SWIFT/ SDK application

Comments 1
1 min read
Introducing SecretLink: The Secure Way to Share Sensitive Information

Introducing SecretLink: The Secure Way to Share Sensitive Information

Comments
2 min read
loading...