DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Bitmasking for Backend RBAC

Bitmasking for Backend RBAC

Comments
4 min read
Private Blockchain Solutions for Digital Identity: Securing Personal Data

Private Blockchain Solutions for Digital Identity: Securing Personal Data

Comments
5 min read
HackTheSite Basic 3

HackTheSite Basic 3

Comments
1 min read
Understanding RSA vs. AES: Which Encryption Should You Use?

Understanding RSA vs. AES: Which Encryption Should You Use?

Comments
1 min read
Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Microsoft 365 Business Standard Security and Productivity Features: What You Get in 2025

Comments
5 min read
Pinning GitHub Actions and using ratchet

Pinning GitHub Actions and using ratchet

Comments
3 min read
Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems

Unlocking Hyper-Security: The Power of AI in Multi-Modal Biometric Systems

Comments
7 min read
Understanding Load Shedding

Understanding Load Shedding

1
Comments
4 min read
The Imperative of Ethical AI: Governance, Auditing, and Responsible Deployment

The Imperative of Ethical AI: Governance, Auditing, and Responsible Deployment

Comments
6 min read
Understanding ASN and Its Role in Web Security

Understanding ASN and Its Role in Web Security

5
Comments
2 min read
Job Application Tip for Node.js Developers

Job Application Tip for Node.js Developers

6
Comments
1 min read
Mastering Enterprise GitOps: Advanced Strategies for Cloud-Native Deployments

Mastering Enterprise GitOps: Advanced Strategies for Cloud-Native Deployments

Comments
5 min read
The standard - S3 IAM Policies

The standard - S3 IAM Policies

1
Comments
6 min read
Browser Security in 2025: Architecture & Dev Trade-offs

Browser Security in 2025: Architecture & Dev Trade-offs

Comments
4 min read
Secure and Simple: Enabling Passwordless SSH Login on Linux Servers

Secure and Simple: Enabling Passwordless SSH Login on Linux Servers

1
Comments
4 min read
The OAuth Integration Nightmare: 8 Critical Components you'll need to build

The OAuth Integration Nightmare: 8 Critical Components you'll need to build

4
Comments 1
15 min read
The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

The Role of AI and Compliance in Modern Risk Management: ShowMeCon 2025

Comments
7 min read
Stop shipping insecure file permissions

Stop shipping insecure file permissions

Comments
1 min read
Windows Lockdown Software: A Comprehensive Guide to Kiosk Mode on Windows 11

Windows Lockdown Software: A Comprehensive Guide to Kiosk Mode on Windows 11

Comments
3 min read
From DevOps to Internal Developer Platforms (IDPs): Why Enterprises Are Building Golden Paths

From DevOps to Internal Developer Platforms (IDPs): Why Enterprises Are Building Golden Paths

Comments
4 min read
SecurePaste – Encrypted, Self-Destructing Paste with No Logs

SecurePaste – Encrypted, Self-Destructing Paste with No Logs

4
Comments
1 min read
🔄 Forgot Password Flow

🔄 Forgot Password Flow

Comments
1 min read
Going Live – What’s Next for DareMe?

Going Live – What’s Next for DareMe?

Comments
1 min read
From MySQL to PostgreSQL: Enforcing Row-Level Security

From MySQL to PostgreSQL: Enforcing Row-Level Security

Comments
2 min read
How C2PA Could Certify AI-Generated Texts (and Why Education Needs It)

How C2PA Could Certify AI-Generated Texts (and Why Education Needs It)

Comments
2 min read
loading...