DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
【Ethical Hacker】Nice to meet you~

【Ethical Hacker】Nice to meet you~

Comments
1 min read
Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

Building Core Banking: A Blueprint for Modern Financial Systems - Introduction

16
Comments
2 min read
Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

Is it ok to send plain-text password over HTTPS? How to pass credentials over network layer from Front - end

8
Comments
2 min read
Is it safe to use encryption with plausible deniability?

Is it safe to use encryption with plausible deniability?

1
Comments
1 min read
Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Introducing Eppie-CLI — the official CLI for Eppie, an open protocol encrypted p2p email

Comments
3 min read
Demo: Automating GitHub Repo Configuration and Security with Minder

Demo: Automating GitHub Repo Configuration and Security with Minder

3
Comments
1 min read
Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

Overcoming IP Restrictions: Leveraging Squid Proxy on Kubernetes for API Consumption

7
Comments 1
3 min read
Build a waitlist with Clerk user metadata

Build a waitlist with Clerk user metadata

7
Comments
9 min read
Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

Preventing IDM: A Tactical Guide to Protecting Your Video Content on Website

3
Comments
2 min read
Top Low-Cost Cybersecurity Measures

Top Low-Cost Cybersecurity Measures

6
Comments 2
4 min read
.NET 8.0 - Securing the API with JWT Bearer Token

.NET 8.0 - Securing the API with JWT Bearer Token

155
Comments 1
5 min read
Understanding OIDC back-channel logout

Understanding OIDC back-channel logout

25
Comments 2
2 min read
Identifiers 101: Understanding and Implementing UUIDs and ULIDs

Identifiers 101: Understanding and Implementing UUIDs and ULIDs

22
Comments 1
5 min read
Exploring the World of Ada and SPARK

Exploring the World of Ada and SPARK

Comments
5 min read
Securing Next.js APIs with Middleware Using Environment Variables

Securing Next.js APIs with Middleware Using Environment Variables

1
Comments
2 min read
Building a Secure dApp: Best Practices and Common Pitfalls

Building a Secure dApp: Best Practices and Common Pitfalls

1
Comments
2 min read
Integrating reCAPTCHA v3 in Next.js

Integrating reCAPTCHA v3 in Next.js

31
Comments 2
2 min read
Dev: Security

Dev: Security

Comments
3 min read
CodeBehind 2.7 Released, Role Access Added!

CodeBehind 2.7 Released, Role Access Added!

1
Comments
7 min read
How to Plan for Compliance for your Product?

How to Plan for Compliance for your Product?

Comments
11 min read
Advanced Magento 2 Security Features: A Deep Dive

Advanced Magento 2 Security Features: A Deep Dive

Comments
2 min read
Proposal - Blockchain Coordination

Proposal - Blockchain Coordination

Comments
5 min read
Is Open Source More Secure? Understanding the Nuances

Is Open Source More Secure? Understanding the Nuances

Comments 2
2 min read
Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

Cognito Inception: How to add Cognito as OIDC Identity Provider in Cognito

5
Comments
7 min read
Types of Computer Security Threats

Types of Computer Security Threats

1
Comments
8 min read
loading...