DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Edge Computing: The Future of Cloud & DevOps

Edge Computing: The Future of Cloud & DevOps

5
Comments
3 min read
Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Is GitHub Sponsors Safe? A Comprehensive Guide to Secure Open Source Funding

Comments
7 min read
Understanding Bcrypt's Work Factor and Choosing the Right Value

Understanding Bcrypt's Work Factor and Choosing the Right Value

Comments
5 min read
🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

Comments
12 min read
PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

PEM, DER, PFX, CER, CRT, and CSR for connecting to servers

Comments
4 min read
🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

1
Comments
1 min read
Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Kubernetes Admission Controllers: The Gatekeepers You Didn't Know You Needed

Comments
2 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
Salesforce Security Best Practices: How to Protect Your CRM Data

Salesforce Security Best Practices: How to Protect Your CRM Data

Comments
1 min read
Security news weekly round-up - 4th April 2025

Security news weekly round-up - 4th April 2025

1
Comments
3 min read
The Pervasive Impact of Ransomware on Cybersecurity.

The Pervasive Impact of Ransomware on Cybersecurity.

Comments
19 min read
What is non-human identity (NHI)?

What is non-human identity (NHI)?

Comments
2 min read
Cloud Monitoring – Ensuring Performance & Security

Cloud Monitoring – Ensuring Performance & Security

Comments
1 min read
5 Cloud Migration Trends You Should Know in 2025

5 Cloud Migration Trends You Should Know in 2025

Comments
2 min read
How to configure passwordless authentication using Ansible

How to configure passwordless authentication using Ansible

6
Comments
2 min read
Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Preventing Pointer Misuse in C++ via Compile-Time Sandboxing (Inspired by Gene Logic)

Comments
1 min read
An Introduction to API Security Automation

An Introduction to API Security Automation

Comments
10 min read
Input/Output Validation: Best Practices for API Communication

Input/Output Validation: Best Practices for API Communication

Comments
10 min read
Identity Theft- a Ad Perspective

Identity Theft- a Ad Perspective

1
Comments
2 min read
ICP Vetkey Quickstart Guide

ICP Vetkey Quickstart Guide

Comments
10 min read
Secure Data Encryption in JavaScript with CryptoSwiftJS

Secure Data Encryption in JavaScript with CryptoSwiftJS

Comments
2 min read
WARNING: Malicious Repository Attack Targeting Cryptocurrency Developers on Upwork

WARNING: Malicious Repository Attack Targeting Cryptocurrency Developers on Upwork

Comments
3 min read
ClatScope Info Tool: Your New OSINT Powerhouse

ClatScope Info Tool: Your New OSINT Powerhouse

Comments
3 min read
SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

SnowFROC 2025: A Chilly Reminder That OWASP Matters and Exploring Secure Coding Practices with AI Coding Bots

Comments
7 min read
Final Year Cybersecurity Project Ideas with source code.

Final Year Cybersecurity Project Ideas with source code.

Comments
1 min read
loading...