DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Secure User Activation System in Django

Building a Secure User Activation System in Django

1
Comments
4 min read
All About CORS Headers

All About CORS Headers

Comments
3 min read
Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Dashboard Interativo de CVE's - AWS Inspector + Lambda + S3

Comments
17 min read
UNDERSTANDING CLOUD SECURITY:Best Practices For Protecting Your Cloud.

UNDERSTANDING CLOUD SECURITY:Best Practices For Protecting Your Cloud.

Comments
3 min read
A step-by-step guide to setting up SSH authentication with YubiKey 5.7 or later version and ED25519-SK keys on Windows 11.

A step-by-step guide to setting up SSH authentication with YubiKey 5.7 or later version and ED25519-SK keys on Windows 11.

Comments
2 min read
What is CompTIA Security+ Certification? A Comprehensive Guide

What is CompTIA Security+ Certification? A Comprehensive Guide

Comments
2 min read
What Are the Key DevOps Security Best Practices to Follow?

What Are the Key DevOps Security Best Practices to Follow?

1
Comments
4 min read
Implementing Devise Lockable: A Step-by-Step Guide to Account Locking in Rails

Implementing Devise Lockable: A Step-by-Step Guide to Account Locking in Rails

Comments
3 min read
Say goodbye to your Personal Access Tokens

Say goodbye to your Personal Access Tokens

2
Comments
8 min read
Email Encryption Types: Overview

Email Encryption Types: Overview

Comments
5 min read
Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Comments
3 min read
Enhancing Open Source Security with Blockchain Technology: A New Frontier

Enhancing Open Source Security with Blockchain Technology: A New Frontier

Comments
2 min read
How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?

How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?

Comments
5 min read
How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

Comments
6 min read
Access Control and Zero-Knowledge

Access Control and Zero-Knowledge

Comments
4 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
đź”’ 7 Ways SQL Injections Destroy Your App

đź”’ 7 Ways SQL Injections Destroy Your App

Comments
5 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
⚡ Secure your containers faster—without disrupting your workflow

⚡ Secure your containers faster—without disrupting your workflow

Comments
3 min read
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

Comments
3 min read
Different types of Authentication when we use that.

Different types of Authentication when we use that.

2
Comments
3 min read
Does Patching Containers Feel Like Whack-a-Mole?

Does Patching Containers Feel Like Whack-a-Mole?

Comments
2 min read
loading...