DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

RC4-EX File Encryption Scheme: Introduction and Application of an Efficient File Encryption Scheme

Comments
1 min read
Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

Value of Frida Dynamic Instrumentation Toolkit to Cybersecurity

1
Comments 1
2 min read
Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Unlocking Cloudflare's Threat Score: Enhance Your Security Without Upgrading Your Plan

Comments
1 min read
Vulnerabilities: Cause for Concern

Vulnerabilities: Cause for Concern

Comments
1 min read
Decoding Fauna: ABAC vs. RBAC Explained

Decoding Fauna: ABAC vs. RBAC Explained

1
Comments
3 min read
11 API Trends to Watch for in 2024

11 API Trends to Watch for in 2024

1
Comments
7 min read
45 Questions to Ask Yourself Before Modeling Authorization

45 Questions to Ask Yourself Before Modeling Authorization

9
Comments
7 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

3
Comments
4 min read
Duplicate Detection Rules in Dynamics 365 CRM.

Duplicate Detection Rules in Dynamics 365 CRM.

1
Comments
1 min read
How to secure API Gateway using JWT and Lambda Authorizers with Clerk

How to secure API Gateway using JWT and Lambda Authorizers with Clerk

18
Comments
11 min read
KYC: What is it and How Does it Work?

KYC: What is it and How Does it Work?

7
Comments
2 min read
Mantendo seus dados segregados por PadrĂŁo

Mantendo seus dados segregados por PadrĂŁo

4
Comments 4
6 min read
Fortress GitHub: Building a Secure Organization

Fortress GitHub: Building a Secure Organization

Comments
6 min read
What's New With AWS Security? | April Edition

What's New With AWS Security? | April Edition

2
Comments
4 min read
Best coding practices: secure dependency management

Best coding practices: secure dependency management

Comments
3 min read
Issue 43 of AWS Cloud Security Weekly

Issue 43 of AWS Cloud Security Weekly

4
Comments
2 min read
Best coding practices: where to put your authorization logic

Best coding practices: where to put your authorization logic

Comments
2 min read
Navigating the Concrete Jungle of APIDays New York 2024

Navigating the Concrete Jungle of APIDays New York 2024

Comments
3 min read
What modern authentication technology do big consumer apps uses?

What modern authentication technology do big consumer apps uses?

8
Comments
3 min read
Building for Tomorrow: Part 2 of the Web Application Security Series

Building for Tomorrow: Part 2 of the Web Application Security Series

4
Comments
3 min read
Do You Need an SBOM?

Do You Need an SBOM?

2
Comments
5 min read
Securing the Foundation: Part 1 of the Web Application Security Series

Securing the Foundation: Part 1 of the Web Application Security Series

3
Comments
5 min read
OpenTofu v1.7: Enhanced Security with State File Encryption

OpenTofu v1.7: Enhanced Security with State File Encryption

6
Comments
3 min read
AWS Automated Centralized Multi Account Patching

AWS Automated Centralized Multi Account Patching

6
Comments
8 min read
Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Don’t Get Salted: A Beginner’s Guide to Hashing Algorithms

Comments
2 min read
loading...