DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
SecurePasswordCrypt: Secure AES-GCM Encryption & Password Hashing for .NET Projects

SecurePasswordCrypt: Secure AES-GCM Encryption & Password Hashing for .NET Projects

4
Comments 1
2 min read
🧠🥷MCP Security (choose safe MCP and check MCP safety)🛡️

🧠🥷MCP Security (choose safe MCP and check MCP safety)🛡️

6
Comments 1
4 min read
Edge Computing: The Future of Cloud & DevOps

Edge Computing: The Future of Cloud & DevOps

7
Comments 1
3 min read
X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

X (Twitter) User Data Breach Alert: Understanding the Risks & Protecting Your Account

1
Comments
2 min read
Enable Aurora logs for security audits

Enable Aurora logs for security audits

3
Comments
4 min read
From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

Comments 3
3 min read
How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

Comments
6 min read
Understanding Bcrypt's Work Factor and Choosing the Right Value

Understanding Bcrypt's Work Factor and Choosing the Right Value

5
Comments
5 min read
How to configure passwordless authentication using Ansible

How to configure passwordless authentication using Ansible

5
Comments
2 min read
Security news weekly round-up - 4th April 2025

Security news weekly round-up - 4th April 2025

2
Comments
3 min read
Access Control and Zero-Knowledge

Access Control and Zero-Knowledge

Comments
4 min read
AI safety controls at scale with Amazon Bedrock Guardrails

AI safety controls at scale with Amazon Bedrock Guardrails

51
Comments 6
6 min read
Understanding CVE-2025-29927 - The Next.js Vulnerability

Understanding CVE-2025-29927 - The Next.js Vulnerability

1
Comments
3 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

1
Comments
10 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
The Hack That Made People Rich.....in Subway Surfers

The Hack That Made People Rich.....in Subway Surfers

2
Comments 2
4 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

1
Comments
2 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

1
Comments
7 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

Verifying Cognito access tokens - Comparing three JWT packages for Lambda authorizers

1
Comments
10 min read
How to Prevent SQL Injection

How to Prevent SQL Injection

1
Comments
2 min read
Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Comments
1 min read
loading...