DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building Cloud Security Efforts with AWS CAF and Well-Architected Framework

Building Cloud Security Efforts with AWS CAF and Well-Architected Framework

Comments
2 min read
Prevent Directory Traversal in Laravel: Expert Guide

Prevent Directory Traversal in Laravel: Expert Guide

1
Comments
2 min read
What is AWS Step Functions? - A Complete Guide

What is AWS Step Functions? - A Complete Guide

13
Comments
9 min read
Laravel Data Encryption and Decryption

Laravel Data Encryption and Decryption

1
Comments 2
3 min read
Demystifying OTPs: the logic behind the offline generation of tokens

Demystifying OTPs: the logic behind the offline generation of tokens

10
Comments 2
16 min read
JSON Web Tokens (JWT)

JSON Web Tokens (JWT)

52
Comments 7
2 min read
Managing traffic using iptables firewall

Managing traffic using iptables firewall

Comments
3 min read
Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Achieving Excellence in Analytics: Strengthening Data Security with Snowflake & Databricks

Comments
2 min read
Secure AWS VPC using Public and Private Subnets

Secure AWS VPC using Public and Private Subnets

3
Comments
10 min read
The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

The Hidden Danger: How Credential Sprawl is Creating Security Blind Spots in Modern Cloud Environments

2
Comments 1
4 min read
Looking for some feedback on my team's new open-source secrets vault project.

Looking for some feedback on my team's new open-source secrets vault project.

2
Comments 2
1 min read
Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

Nosecone: a library for setting security headers in Next.js, SvelteKit, Node.js, Bun, and Deno

5
Comments
4 min read
Turning a Customer Security Concern into a Feature

Turning a Customer Security Concern into a Feature

4
Comments
2 min read
picoCTF "Breadth" Walkthrough

picoCTF "Breadth" Walkthrough

Comments
5 min read
AI Engineer's Tool Review: Guardrails AI

AI Engineer's Tool Review: Guardrails AI

Comments
1 min read
The Role of Machine Learning in Enhancing Network Security

The Role of Machine Learning in Enhancing Network Security

1
Comments
3 min read
CCSP Study Guide: How to Prepare for the CCSP Exam

CCSP Study Guide: How to Prepare for the CCSP Exam

Comments 1
5 min read
Ensuring Secure and Efficient Banking Apps through Rigorous Testing

Ensuring Secure and Efficient Banking Apps through Rigorous Testing

4
Comments
5 min read
🍯 Honeypot field: an easy to implement React security technique

🍯 Honeypot field: an easy to implement React security technique

1
Comments
2 min read
Cloud Security with AWS IAM

Cloud Security with AWS IAM

Comments
1 min read
Secure Video Conferencing and Encryption is the Future

Secure Video Conferencing and Encryption is the Future

Comments
2 min read
Two Years in the Vault: 4 Best Practices đź”’

Two Years in the Vault: 4 Best Practices đź”’

11
Comments
9 min read
What is a Reverse Proxy? How It Works and Why You Need It

What is a Reverse Proxy? How It Works and Why You Need It

Comments
8 min read
Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

Docker Advance Part 3: Best Way to Define Passwords In Docker Compose File

5
Comments
1 min read
Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

Don't Risk It: Implement Zero Trust Security Today for Ultimate Protection

5
Comments
2 min read
loading...