DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Docker Swarm vs Kubernetes - A Deep Technical Analysis

Docker Swarm vs Kubernetes - A Deep Technical Analysis

5
Comments
7 min read
What is AWS Lightsail? - A DevOps Engineer's Perspective

What is AWS Lightsail? - A DevOps Engineer's Perspective

5
Comments
6 min read
Giới thiệu căn bản về thư viện JasperReports

Giới thiệu căn bản về thư viện JasperReports

Comments
7 min read
WRITE-UP ASCIS 2023

WRITE-UP ASCIS 2023

Comments
6 min read
Code Quality in the Cloud

Code Quality in the Cloud

Comments
6 min read
Adding API Key Authentication to a Firestore API

Adding API Key Authentication to a Firestore API

Comments
12 min read
Integrating Clerk With Zuplo For Seamless API Authentication

Integrating Clerk With Zuplo For Seamless API Authentication

Comments
6 min read
Why Zuplo Has the Best Damn Rate Limiter on the Planet

Why Zuplo Has the Best Damn Rate Limiter on the Planet

Comments
2 min read
Rebuttal: API keys can do everything

Rebuttal: API keys can do everything

Comments
7 min read
Zero Downtime migration of API Authentication

Zero Downtime migration of API Authentication

Comments
4 min read
Day 1 - Introducing the ZAPI Management API

Day 1 - Introducing the ZAPI Management API

Comments
3 min read
User-level auth in your Supabase API - Supaweek Day 2

User-level auth in your Supabase API - Supaweek Day 2

Comments
4 min read
Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Comments
4 min read
Day 5 - Announcing v2 of react-api-key-manager

Day 5 - Announcing v2 of react-api-key-manager

Comments
1 min read
Adding Developer Portal Access and Request Validation to a Firestore API

Adding Developer Portal Access and Request Validation to a Firestore API

Comments
7 min read
Using PropelAuth to secure your API at the Gateway

Using PropelAuth to secure your API at the Gateway

Comments
3 min read
Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Comments
7 min read
Tips and Best Practices for API Authentication

Tips and Best Practices for API Authentication

Comments
10 min read
Simple HTTP Authentication: A Beginner’s Guide

Simple HTTP Authentication: A Beginner’s Guide

Comments
9 min read
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Comments
9 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Comments
4 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

6
Comments
2 min read
Why Security Testing is a Must-Have for Fintech Success

Why Security Testing is a Must-Have for Fintech Success

Comments
4 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Password Hashing in Python

Password Hashing in Python

Comments
1 min read
𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

5
Comments
2 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
Your rich text could be a cross-site scripting vulnerability

Your rich text could be a cross-site scripting vulnerability

Comments
8 min read
Protect Your API Gateway with AWS WAF using CDK

Protect Your API Gateway with AWS WAF using CDK

Comments
5 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
Azure OpenAI vs OpenAI

Azure OpenAI vs OpenAI

Comments
2 min read
⚖️ The Importance of Using ReentrancyGuard in Solidity Smart Contract

⚖️ The Importance of Using ReentrancyGuard in Solidity Smart Contract

Comments
3 min read
Formal Verification: An Example

Formal Verification: An Example

Comments
5 min read
Building a Security System, with motion detection and time based settings using Arduino

Building a Security System, with motion detection and time based settings using Arduino

Comments
4 min read
Security news weekly round-up - 13th December 2024

Security news weekly round-up - 13th December 2024

Comments
3 min read
Como Habilitar o Provedor Legado no OpenSSL 3.x

Como Habilitar o Provedor Legado no OpenSSL 3.x

Comments
2 min read
Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Comments
7 min read
How to scan a port and import the results using Metasploitable and Kali Linux

How to scan a port and import the results using Metasploitable and Kali Linux

Comments
2 min read
HTTPS for Django Development Environment

HTTPS for Django Development Environment

Comments
5 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
Rootless Containers: What They Are and Why You Should Use Them

Rootless Containers: What They Are and Why You Should Use Them

Comments
3 min read
How to Create a Workspace in Metasploit Console

How to Create a Workspace in Metasploit Console

Comments
1 min read
How to Activate and Enable the PostgreSQL Service on Your Kali Linux System

How to Activate and Enable the PostgreSQL Service on Your Kali Linux System

Comments
1 min read
Building Cloud Security Efforts with AWS CAF and Well-Architected Framework

Building Cloud Security Efforts with AWS CAF and Well-Architected Framework

Comments
2 min read
Managing traffic using iptables firewall

Managing traffic using iptables firewall

Comments
3 min read
Trivy Vulnerability Scans Adnvanced Filtering

Trivy Vulnerability Scans Adnvanced Filtering

Comments
2 min read
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets

Comments
1 min read
picoCTF "Breadth" Walkthrough

picoCTF "Breadth" Walkthrough

Comments
5 min read
CCSP Study Guide: How to Prepare for the CCSP Exam

CCSP Study Guide: How to Prepare for the CCSP Exam

Comments
5 min read
loading...