DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Vulnerabilities: Cause for Concern

Vulnerabilities: Cause for Concern

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
11 API Trends to Watch for in 2024

11 API Trends to Watch for in 2024

1
Comments
7 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

9
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

3
Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

1
Comments
1 min read
How to secure API Gateway using JWT and Lambda Authorizers with Clerk

How to secure API Gateway using JWT and Lambda Authorizers with Clerk

18
Comments
11 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Mantendo seus dados segregados por PadrĂŁo

Mantendo seus dados segregados por PadrĂŁo

4
Comments 4
6 min read
Fortress GitHub: Building a Secure Organization

Fortress GitHub: Building a Secure Organization

Comments
6 min read
What's New With AWS Security? | April Edition

What's New With AWS Security? | April Edition

2
Comments
4 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
Building for Tomorrow: Part 2 of the Web Application Security Series

Building for Tomorrow: Part 2 of the Web Application Security Series

4
Comments
3 min read
Do You Need an SBOM?

Do You Need an SBOM?

2
Comments
5 min read
Securing the Foundation: Part 1 of the Web Application Security Series

Securing the Foundation: Part 1 of the Web Application Security Series

3
Comments
5 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

6
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

6
Comments
8 min read
Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Comments
2 min read
How Amazon GuardDuty can help keep Amazon EKS secure

How Amazon GuardDuty can help keep Amazon EKS secure

8
Comments
3 min read
How to know if you have the XZ vulnerability and what you can do about it

How to know if you have the XZ vulnerability and what you can do about it

Comments
2 min read
Securely connect to an Amazon RDS

Securely connect to an Amazon RDS

5
Comments
3 min read
loading...