DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Microsoft Defender for Storage: Threat Detection & Protection for Your Data

Comments
3 min read
[Vulnerability Campaign] Protect TECNO devices

[Vulnerability Campaign] Protect TECNO devices

Comments
1 min read
How to Secure AWS Lambda Webhooks With Signature Verification

How to Secure AWS Lambda Webhooks With Signature Verification

Comments
2 min read
User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

User Management in Red Hat Linux: Proven Strategies and Practical Use Cases

5
Comments
5 min read
Why do we need OAuth ?

Why do we need OAuth ?

5
Comments
2 min read
Exploiting Websites

Exploiting Websites

1
Comments
2 min read
SSO vs OAuth – Understand the Key Difference

SSO vs OAuth – Understand the Key Difference

5
Comments
2 min read
Snyk and Sonar : committed credentials security test

Snyk and Sonar : committed credentials security test

2
Comments
6 min read
How to Implement Secure Random Number Generation in JavaScript

How to Implement Secure Random Number Generation in JavaScript

Comments
2 min read
The Atlassian OAuth Disaster Nobody’s Talking About

The Atlassian OAuth Disaster Nobody’s Talking About

Comments
1 min read
Rethinking AI in Security

Rethinking AI in Security

Comments
5 min read
Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

Secure Authentication & Authorization in ASP.NET Core 9.0: A Step-by-Step Guide

Comments
3 min read
The Password Graveyard

The Password Graveyard

4
Comments
4 min read
AWS Security Specialty

AWS Security Specialty

Comments
1 min read
CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

CoreIdent v0.3.5: OIDC ID Tokens, Real-World Gaps, and What’s Next

Comments
2 min read
Securing APIs Against Unauthorized Access

Securing APIs Against Unauthorized Access

Comments
1 min read
Beware the Global Const

Beware the Global Const

Comments
5 min read
10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

10 Cybersecurity Safety Protocols Every Developer Should Live By 🔐

Comments
3 min read
Understanding RSA - The Math behind modern encryption

Understanding RSA - The Math behind modern encryption

Comments
3 min read
4 OSQuery Commands to run on a Mac

4 OSQuery Commands to run on a Mac

Comments
2 min read
Guards vs Interceptors no NestJS: quando usar cada um?

Guards vs Interceptors no NestJS: quando usar cada um?

Comments
3 min read
AWS Shared Responsibility Model and Security Principles

AWS Shared Responsibility Model and Security Principles

Comments
3 min read
From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

From Euclid to Euler: A Journey Through Primes, Proofs, and Modern Cryptography

Comments
3 min read
SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

SAST vs SCA: Choosing the Right Source Code Security Scanning Tools

1
Comments
5 min read
The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

The State of Cyber Security in Africa: Challenges, Growth, and the Road Ahead

Comments
2 min read
loading...