DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
[Vulnerability Campaign] Protect TECNO devices

[Vulnerability Campaign] Protect TECNO devices

Comments
1 min read
How to Secure AWS Lambda Webhooks With Signature Verification

How to Secure AWS Lambda Webhooks With Signature Verification

Comments
2 min read
User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

5
Comments
5 min read
Why do we need OAuth ?

Why do we need OAuth ?

5
Comments
2 min read
Exploiting Websites

Exploiting Websites

1
Comments
2 min read
SSO vs OAuth – Understand the Key Difference

SSO vs OAuth – Understand the Key Difference

5
Comments
2 min read
Snyk and Sonar : committed credentials security test

Snyk and Sonar : committed credentials security test

2
Comments
6 min read
How to Implement Secure Random Number Generation in JavaScript

How to Implement Secure Random Number Generation in JavaScript

Comments
2 min read
The Atlassian OAuth Disaster Nobody’s Talking About

The Atlassian OAuth Disaster Nobody’s Talking About

Comments
1 min read
Rethinking AI in Security

Rethinking AI in Security

Comments
5 min read
Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

Comments
3 min read
The Password Graveyard

The Password Graveyard

4
Comments
4 min read
AWS Security Specialty

AWS Security Specialty

Comments
1 min read
CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

Comments
2 min read
Securing APIs Against Unauthorized Access

Securing APIs Against Unauthorized Access

Comments
1 min read
Beware the Global Const

Beware the Global Const

Comments
5 min read
10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

Comments
3 min read
Understanding RSA - The Math behind modern encryption

Understanding RSA - The Math behind modern encryption

Comments
3 min read
4 OSQuery Commands to run on a Mac

4 OSQuery Commands to run on a Mac

Comments
2 min read
Guards vs Interceptors no NestJS: quando usar cada um?

Guards vs Interceptors no NestJS: quando usar cada um?

Comments
3 min read
AWS Shared Responsibility Model and Security Principles

AWS Shared Responsibility Model and Security Principles

Comments
3 min read
From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

Comments
3 min read
SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

1
Comments
5 min read
The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

Comments
2 min read
Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Authentication without secrets to protect or public keys to distribute. Yay, nay or meh?

Comments
10 min read
loading...