DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Caption this image! (Azure & CrowdStrike outages)

Caption this image! (Azure & CrowdStrike outages)

9
3
1 min read
Security news weekly round-up - 19th July 2024

Security news weekly round-up - 19th July 2024

1
3 min read
Secure and Resilient Design

Secure and Resilient Design

2
16 min read
Unveiling the Future of Cybersecurity: How AI is Revolutionizing Protection Online

Unveiling the Future of Cybersecurity: How AI is Revolutionizing Protection Online

2 min read
Enhancing OIDC security with demonstrating proof of possession (DPoP)

Enhancing OIDC security with demonstrating proof of possession (DPoP)

15
3 min read
Best Practices for Securing Cloud computing Environments and Data

Best Practices for Securing Cloud computing Environments and Data

6 min read
Sign in with Apple for Node.js

Sign in with Apple for Node.js

7 min read
5 Best Video Hosting Platforms for 2024

5 Best Video Hosting Platforms for 2024

4 min read
Alien biohazard approach to security

Alien biohazard approach to security

2 min read
The Silent Threat: Cybersecurity Risks Every Small Business Must Confront

The Silent Threat: Cybersecurity Risks Every Small Business Must Confront

2 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

6 min read
Why we built Resourcely

Why we built Resourcely

6 min read
Configuring Routes for Azure Firewall (Part 4)

Configuring Routes for Azure Firewall (Part 4)

2 min read
VerifyVault v0.4.1 has been RELEASED! 🚀

VerifyVault v0.4.1 has been RELEASED! 🚀

1
1 min read
Security Meetup

Security Meetup

1 min read
Decrypting the Future: The Evolution of Ransomware and How to Safeguard Against It

Decrypting the Future: The Evolution of Ransomware and How to Safeguard Against It

2 min read
Exporting private keys in plang programming language

Exporting private keys in plang programming language

2 min read
Up(sun) and running with Rust: The game-changer in systems programming

Up(sun) and running with Rust: The game-changer in systems programming

1 min read
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

8 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
4 min read
Quick Facts On the AT&T Breach

Quick Facts On the AT&T Breach

1 min read
Prescription for Cybersecurity: Safeguarding Healthcare Data in the Digital Age

Prescription for Cybersecurity: Safeguarding Healthcare Data in the Digital Age

1
2 min read
How to disable Spring Security for static resources

How to disable Spring Security for static resources

2 min read
Securing Data at Rest: The Importance of Encryption and How to Implement It

Securing Data at Rest: The Importance of Encryption and How to Implement It

3 min read
Biometric Boom: The Future of Authentication Is Here

Biometric Boom: The Future of Authentication Is Here

2 min read
Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

2
2 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

10
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

9
3 min read
Enhanced Web Application Security with Azure Network Security Groups and Application Security Groups (Part 2)

Enhanced Web Application Security with Azure Network Security Groups and Application Security Groups (Part 2)

7
4 min read
Gitleaks: Find forgotten codes in your repositories

Gitleaks: Find forgotten codes in your repositories

1 min read
Exposed: The Shocking Truth About Data Breaches You Need to Know!

Exposed: The Shocking Truth About Data Breaches You Need to Know!

2 min read
SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

5
6 min read
Security news weekly round-up - 12th July 2024

Security news weekly round-up - 12th July 2024

4 min read
How to avoid one of the biggest risks in mobile security as an iOS developer

How to avoid one of the biggest risks in mobile security as an iOS developer

6 min read
Top 10 Cloud Security Startups to Watch in 2024

Top 10 Cloud Security Startups to Watch in 2024

8
6 min read
EnvLock: The Ultimate Env Manager

EnvLock: The Ultimate Env Manager

7
2
4 min read
Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

Elevating Cloud Security: Highlights from CloudNativeSecurityCon 2024

1
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

1 min read
Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

Masking vs Encryption in JavaScript: A Comprehensive Guide for Secure Data Handling

1
3 min read
Top 10 Application Security Vulnerabilities in 2024

Top 10 Application Security Vulnerabilities in 2024

6 min read
Proteger mediante CloudFlare un sitio alojado en S3

Proteger mediante CloudFlare un sitio alojado en S3

2
2 min read
Creating Cross-Account DynamoDB Backups with Terraform

Creating Cross-Account DynamoDB Backups with Terraform

1
4 min read
VaultWarden: Your local password manager

VaultWarden: Your local password manager

1
5 min read
From Privacy Pioneers to Digital Guardians: Tracing the Evolution of Privacy Regulations

From Privacy Pioneers to Digital Guardians: Tracing the Evolution of Privacy Regulations

2 min read
How to Handle Secrets in Jupyter Notebooks

How to Handle Secrets in Jupyter Notebooks

2
8 min read
Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

Designing B2B Authentication Experiences: Universal vs. Organization-Specific Login

2 min read
BSides Boulder 2024: Improving Security For All In The High Desert

BSides Boulder 2024: Improving Security For All In The High Desert

1
6 min read
VerifyVault v0.4 has been RELEASED! 🚀

VerifyVault v0.4 has been RELEASED! 🚀

1 min read
Build vs. Buy: How to approach SSO for your SaaS app

Build vs. Buy: How to approach SSO for your SaaS app

1
4 min read
Effective Strategies for MySQL User Management

Effective Strategies for MySQL User Management

1 min read
WebCheck: Find out what hackers know about your site

WebCheck: Find out what hackers know about your site

1
1 min read
Intersection of AI and Data Privacy

Intersection of AI and Data Privacy

2
4 min read
OAuth em aplicações SPA / Mobile (PKCE extension)

OAuth em aplicações SPA / Mobile (PKCE extension)

1
4 min read
New Securi-Taco Tuesdays Livestream (Monthly)

New Securi-Taco Tuesdays Livestream (Monthly)

2
2 min read
Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

Introducing PhishShield: The Ultimate Phishing Simulation Platform for Robust Security Testing !!!

2 min read
JavaScript app security audit

JavaScript app security audit

2 min read
Securing the Cloud #32

Securing the Cloud #32

5 min read
Battle of the Shields: Unveiling the Best Two-Factor Authentication Method!

Battle of the Shields: Unveiling the Best Two-Factor Authentication Method!

2 min read
Issue 52 of AWS Cloud Security Weekly

Issue 52 of AWS Cloud Security Weekly

3
1 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

3 min read
loading...