DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Do Red Rooms Really Exist? Unpacking the Dark‑Web Rumor

Do Red Rooms Really Exist? Unpacking the Dark‑Web Rumor

Comments
3 min read
Working with API Rate Limits: Lessons from Developer Mistakes

Working with API Rate Limits: Lessons from Developer Mistakes

Comments
4 min read
Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects

1
Comments
6 min read
I Tested hcef: A Native C++ Encryption Module for Node.js That Deserves More Attention

I Tested hcef: A Native C++ Encryption Module for Node.js That Deserves More Attention

Comments
2 min read
How to clone documents with form fields in BoldSign

How to clone documents with form fields in BoldSign

2
Comments
4 min read
Securing No-Code/Low-Code Platforms: A Comprehensive Guide to Enterprise Security

Securing No-Code/Low-Code Platforms: A Comprehensive Guide to Enterprise Security

Comments
7 min read
How to Protect Your API with OpenFGA: From ReBAC Concepts to Practical Usage

How to Protect Your API with OpenFGA: From ReBAC Concepts to Practical Usage

2
Comments 2
17 min read
The Imperative of AI API Security: Protecting Your Intelligent Systems

The Imperative of AI API Security: Protecting Your Intelligent Systems

Comments
6 min read
What is Proxy Server: Forward vs. Reverse Proxy (Explained)

What is Proxy Server: Forward vs. Reverse Proxy (Explained)

Comments
6 min read
AI in Cybersecurity: Navigating the Ethical Minefield

AI in Cybersecurity: Navigating the Ethical Minefield

Comments
5 min read
Advances and Challenges in Cryptography and Security: A Synthesis of Recent Research in cs.CR from AI Frontiers

Advances and Challenges in Cryptography and Security: A Synthesis of Recent Research in cs.CR from AI Frontiers

Comments
7 min read
AWS GuardDuty vs AWS Inspector: What AWS Developers Need to Know in 2025

AWS GuardDuty vs AWS Inspector: What AWS Developers Need to Know in 2025

9
Comments 3
5 min read
“Attention Is All You Need”: A DevOps-Inspired Interpretation

“Attention Is All You Need”: A DevOps-Inspired Interpretation

Comments
5 min read
Tigris's object store's authentication & authorization

Tigris's object store's authentication & authorization

Comments
3 min read
Navigating Client-Side Encryption

Navigating Client-Side Encryption

Comments
3 min read
The Dawn of Post-Quantum Cryptography: NIST's New Standards and Your Digital Future

The Dawn of Post-Quantum Cryptography: NIST's New Standards and Your Digital Future

Comments
7 min read
AI Chatbot for Cybersecurity

AI Chatbot for Cybersecurity

Comments
1 min read
Will AI Replace Traditional SBOM Tools? Exploring the Future of Software Supply Chain Security

Will AI Replace Traditional SBOM Tools? Exploring the Future of Software Supply Chain Security

Comments
1 min read
Which Programming Languages Fuel Today’s Malware Attacks

Which Programming Languages Fuel Today’s Malware Attacks

Comments
5 min read
Securing Kubernetes Workloads with Falco

Securing Kubernetes Workloads with Falco

Comments
3 min read
Laravel 11 Security Audit Guide (Part 1 of 3)

Laravel 11 Security Audit Guide (Part 1 of 3)

Comments
5 min read
Implement Rate Limiting in ASP.NET Core [.NET9]

Implement Rate Limiting in ASP.NET Core [.NET9]

10
Comments 6
4 min read
Beyond Encryption: How Confidential Computing Secures AI Workloads

Beyond Encryption: How Confidential Computing Secures AI Workloads

Comments
7 min read
Mastering GitOps at Scale: Strategies for Multi-Cloud, Hybrid, and Edge

Mastering GitOps at Scale: Strategies for Multi-Cloud, Hybrid, and Edge

Comments
6 min read
Passwordless Authentication ROI: TCO & Implementation Guide for Devs

Passwordless Authentication ROI: TCO & Implementation Guide for Devs

1
Comments
3 min read
loading...