DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding AWS RAM: Benefits and Use Cases

Understanding AWS RAM: Benefits and Use Cases

5
Comments 1
1 min read
What do hackers know about your website?

What do hackers know about your website?

Comments
2 min read
Is GitHub Sponsors Safe? A Comprehensive Guide

Is GitHub Sponsors Safe? A Comprehensive Guide

1
Comments
8 min read
Optimizing Docker Images: Reducing Size and Improving Security

Optimizing Docker Images: Reducing Size and Improving Security

3
Comments 1
5 min read
Online privacy isn’t niche anymore - it’s global.

Online privacy isn’t niche anymore - it’s global.

Comments
2 min read
HOW TO CREATE AND CONFIGURE AZURE FIREWALL

HOW TO CREATE AND CONFIGURE AZURE FIREWALL

Comments
4 min read
Building a Reverse Shell in Rust Using PEB Techniques

Building a Reverse Shell in Rust Using PEB Techniques

1
Comments
2 min read
Mastering External API Usage in Angular Interceptors with x-api-key

Mastering External API Usage in Angular Interceptors with x-api-key

Comments
4 min read
Achieve Highest level of security with BoldSign’s QES Compliance

Achieve Highest level of security with BoldSign’s QES Compliance

5
Comments
3 min read
Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

2
Comments
4 min read
Segurança no Front-end: dos ataques à prevenção

Segurança no Front-end: dos ataques à prevenção

39
Comments 4
7 min read
Cybersecurity for Small Businesses: A Complete Guide

Cybersecurity for Small Businesses: A Complete Guide

Comments 2
4 min read
Threat Modeling for AI Apps | AI Security series

Threat Modeling for AI Apps | AI Security series

1
Comments
3 min read
Local Whisper & VoIP PBX: Why Maryrose Whittaker Sees On-Prem as the Privacy Linchpin

Local Whisper & VoIP PBX: Why Maryrose Whittaker Sees On-Prem as the Privacy Linchpin

Comments
3 min read
How to Receive Phone Call 📞 Alerts Using AWS CloudWatch, Lambda & Twilio

How to Receive Phone Call 📞 Alerts Using AWS CloudWatch, Lambda & Twilio

Comments
3 min read
What If Your App Becomes a Tool for Scammers?

What If Your App Becomes a Tool for Scammers?

Comments
9 min read
Using RBAC in Kubernetes: Role-Based Access Control Demystified

Using RBAC in Kubernetes: Role-Based Access Control Demystified

Comments
3 min read
JWT Security with OAuth

JWT Security with OAuth

1
Comments
1 min read
🐞 Comprehensive Bug Bounty Hunting Methodology

🐞 Comprehensive Bug Bounty Hunting Methodology

1
Comments
32 min read
Fortifying Cloud-Native Applications: Key Security Measures

Fortifying Cloud-Native Applications: Key Security Measures

Comments
13 min read
Unlocking Transparency: The Role of Blockchain Audit Trails in Modern Security

Unlocking Transparency: The Role of Blockchain Audit Trails in Modern Security

Comments
8 min read
SQL Server 2022 Standard with 5 Device CAL: A Scalable, Secure, and Efficient Database Solution for Modern Businesses

SQL Server 2022 Standard with 5 Device CAL: A Scalable, Secure, and Efficient Database Solution for Modern Businesses

Comments
4 min read
7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Securing Temporary Credentials in AWS: What You Should Be Doing But Probably Aren’t

Securing Temporary Credentials in AWS: What You Should Be Doing But Probably Aren’t

Comments
2 min read
5 Key Application Security Types & The Tools You Need to Protect Them

5 Key Application Security Types & The Tools You Need to Protect Them

1
Comments
5 min read
loading...