DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to Receive Phone Call 📞 Alerts Using AWS CloudWatch, Lambda & Twilio

How to Receive Phone Call 📞 Alerts Using AWS CloudWatch, Lambda & Twilio

Comments
3 min read
What If Your App Becomes a Tool for Scammers?

What If Your App Becomes a Tool for Scammers?

Comments
9 min read
JWT Security with OAuth

JWT Security with OAuth

1
Comments
1 min read
Using RBAC in Kubernetes: Role-Based Access Control Demystified

Using RBAC in Kubernetes: Role-Based Access Control Demystified

Comments
3 min read
🐞 Comprehensive Bug Bounty Hunting Methodology

🐞 Comprehensive Bug Bounty Hunting Methodology

1
Comments
32 min read
Fortifying Cloud-Native Applications: Key Security Measures

Fortifying Cloud-Native Applications: Key Security Measures

Comments
13 min read
Unlocking Transparency: The Role of Blockchain Audit Trails in Modern Security

Unlocking Transparency: The Role of Blockchain Audit Trails in Modern Security

Comments
8 min read
SQL Server 2022 Standard with 5 Device CAL: A Scalable, Secure, and Efficient Database Solution for Modern Businesses

SQL Server 2022 Standard with 5 Device CAL: A Scalable, Secure, and Efficient Database Solution for Modern Businesses

Comments
4 min read
7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

7 Linux Security Mistakes I Made (So You Don’t Have To) | by Faruk Ahmed | Apr, 2025

Comments
1 min read
Securing Temporary Credentials in AWS: What You Should Be Doing But Probably Aren’t

Securing Temporary Credentials in AWS: What You Should Be Doing But Probably Aren’t

Comments
2 min read
5 Key Application Security Types & The Tools You Need to Protect Them

5 Key Application Security Types & The Tools You Need to Protect Them

1
Comments
5 min read
Add Demo Blog using hashnodeApis

Add Demo Blog using hashnodeApis

Comments
1 min read
How to Integrate JWT in Spring Boot

How to Integrate JWT in Spring Boot

Comments
1 min read
Authentication using NestJS and JWT

Authentication using NestJS and JWT

Comments
2 min read
What Are White Hat Hackers? A Guide to Ethical Hacking

What Are White Hat Hackers? A Guide to Ethical Hacking

Comments
6 min read
i just made an encryption algorithm for some reason:D

i just made an encryption algorithm for some reason:D

Comments 3
1 min read
Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Comments
7 min read
Zero-Day Exploits: What They Are, How They Work, and How to Defend Against Them

Zero-Day Exploits: What They Are, How They Work, and How to Defend Against Them

Comments
6 min read
Understanding IoT Attacks: Types, Risks, and Protection Strategies

Understanding IoT Attacks: Types, Risks, and Protection Strategies

Comments
4 min read
Port 80 Explained: A Complete Guide

Port 80 Explained: A Complete Guide

Comments
4 min read
PKI Demystified: From That Green Lock to Digital Trust

PKI Demystified: From That Green Lock to Digital Trust

1
Comments
4 min read
Confidential Computing: Unlocking the Future of Secure AI and ML

Confidential Computing: Unlocking the Future of Secure AI and ML

1
Comments 1
6 min read
Understanding Trojans: What They Are and How to Protect Yourself

Understanding Trojans: What They Are and How to Protect Yourself

1
Comments
6 min read
What is Adware? Understanding Its Impact and How to Protect Yourself

What is Adware? Understanding Its Impact and How to Protect Yourself

1
Comments
6 min read
Understanding Keylogging: What It Is, Risks, and How to Protect Yourself

Understanding Keylogging: What It Is, Risks, and How to Protect Yourself

Comments
6 min read
loading...