DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
If You Can't Control Access, You Can't Control the Cloud (Part 1)

If You Can't Control Access, You Can't Control the Cloud (Part 1)

3
Comments 1
6 min read
Understanding Kubernetes RBAC

Understanding Kubernetes RBAC

Comments
3 min read
Your First Steps to a Hardened SSH Server

Your First Steps to a Hardened SSH Server

Comments
6 min read
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Comments
3 min read
Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

1
Comments
13 min read
Mastering XSS Prevention: Tips for Developers

Mastering XSS Prevention: Tips for Developers

Comments
12 min read
How to Secure AWS Lambda Webhooks With Signature Verification

How to Secure AWS Lambda Webhooks With Signature Verification

Comments
2 min read
User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

6
Comments
5 min read
Understanding XSRF Protection: Implementation in Fetch vs. Axios

Understanding XSRF Protection: Implementation in Fetch vs. Axios

5
Comments 2
7 min read
The Rising Threat of DDoS Attacks: What You Need to Know

The Rising Threat of DDoS Attacks: What You Need to Know

1
Comments
3 min read
What is Security? The Basics You Need to Know - Code Bastion

What is Security? The Basics You Need to Know - Code Bastion

Comments
5 min read
API Security: The First Steps Toward a Fortified Backend

API Security: The First Steps Toward a Fortified Backend

Comments
3 min read
Why do we need OAuth ?

Why do we need OAuth ?

7
Comments
2 min read
SSO vs OAuth – Understand the Key Difference

SSO vs OAuth – Understand the Key Difference

5
Comments
2 min read
Misconfig Mapper: Your New Secret Weapon for Cloud Security

Misconfig Mapper: Your New Secret Weapon for Cloud Security

Comments
3 min read
Beware the Global Const

Beware the Global Const

1
Comments 5
5 min read
Snyk and Sonar : committed credentials security test

Snyk and Sonar : committed credentials security test

3
Comments
6 min read
TROUBLESHOOTING DNS PROBLEMS IN AN ACTIVE DIRECTORY DOMAIN CONTROLLER

TROUBLESHOOTING DNS PROBLEMS IN AN ACTIVE DIRECTORY DOMAIN CONTROLLER

Comments
2 min read
Complete Guide to Performance Testing in 2025🔥

Complete Guide to Performance Testing in 2025🔥

Comments
1 min read
Exploiting Websites

Exploiting Websites

2
Comments
2 min read
Enhancing Endpoint Security with Microsoft Intune and Microsoft Copilot for Security

Enhancing Endpoint Security with Microsoft Intune and Microsoft Copilot for Security

Comments
2 min read
[Best of February - M3Di] From Forest to Code: Transformational Security Researcher Growth Notes

[Best of February - M3Di] From Forest to Code: Transformational Security Researcher Growth Notes

Comments
1 min read
Connecting to a Private RDS Instance via an EC2 Proxy

Connecting to a Private RDS Instance via an EC2 Proxy

7
Comments
2 min read
The Password Graveyard

The Password Graveyard

4
Comments
4 min read
Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

9
Comments 2
3 min read
loading...