DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Web Security with Content Security Policy (CSP) and JavaScript

Web Security with Content Security Policy (CSP) and JavaScript

Comments
4 min read
Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Comparing Secrets Detection Solutions? Here’s Why You Should Use the F1 Score

Comments
10 min read
HealthCare Sector

HealthCare Sector

Comments
1 min read
Understanding Proxy Servers

Understanding Proxy Servers

Comments
4 min read
Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Executive Order 14144 on Cybersecurity: Building on 2021's Foundation with Advanced NHI Security

Comments
6 min read
Staying Secure & Connected While Traveling

Staying Secure & Connected While Traveling

Comments
1 min read
HttpOnly Cookies: A Secure Solution for Sensitive Data

HttpOnly Cookies: A Secure Solution for Sensitive Data

Comments
3 min read
Security news weekly round-up - 7th February 2025

Security news weekly round-up - 7th February 2025

1
Comments
4 min read
CEH: Advanced Penetration Testing Guide

CEH: Advanced Penetration Testing Guide

Comments
3 min read
Top 8 API Management Trends in 2025

Top 8 API Management Trends in 2025

7
Comments
8 min read
Guardius: Your DevOps and Security Companion

Guardius: Your DevOps and Security Companion

Comments
3 min read
Essential Security Best Practices for Ruby on Rails

Essential Security Best Practices for Ruby on Rails

6
Comments
10 min read
Deploying smartcontracts through github actions using AWS secret manager

Deploying smartcontracts through github actions using AWS secret manager

Comments
4 min read
Secure Google Drive Picker: Token Best Practices

Secure Google Drive Picker: Token Best Practices

2
Comments 1
2 min read
Understanding eBPF: A Game-Changer for Linux Kernel Extensions

Understanding eBPF: A Game-Changer for Linux Kernel Extensions

Comments
2 min read
LTL and CTL Applications for Smart Contracts Security

LTL and CTL Applications for Smart Contracts Security

Comments
3 min read
Building Scalable PHP Applications: Best Practices for Performance and Security

Building Scalable PHP Applications: Best Practices for Performance and Security

Comments
3 min read
AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

AZ900-Exam Ref by Jim Cheshire Chapter 1 Skill 1.2

Comments
4 min read
Security news weekly round-up - 31st January 2025

Security news weekly round-up - 31st January 2025

1
Comments
4 min read
DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

DeepSeek's Data Breach: A Wake-Up Call for AI Data Security

Comments
6 min read
One of the biggest bank heists in history

One of the biggest bank heists in history

Comments
1 min read
Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Why IPSec is a Game-Changer for Your Network Security (And How to Use It!) 🚀

Comments
3 min read
Bow to the rectangle

Bow to the rectangle

Comments
3 min read
Tutorial: Credit card cracking explained — and how to prevent it

Tutorial: Credit card cracking explained — and how to prevent it

Comments
12 min read
Computer Viruses in Practice: Self-Replication

Computer Viruses in Practice: Self-Replication

Comments
6 min read
loading...