DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Post-Quantum Cryptography
Cover image for Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
Google OIDC and Prompt Login
Cover image for Google OIDC and Prompt Login

Google OIDC and Prompt Login

2
Comments
1 min read
🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

🔐 Secure Secret Management with SOPS in Terraform & Terragrunt

5
Comments
3 min read
RS Authenticator – Your Ultimate 2FA Security Solution!
Cover image for RS Authenticator – Your Ultimate 2FA Security Solution!

RS Authenticator – Your Ultimate 2FA Security Solution!

Comments
1 min read
Introducing SmartScanner: Your Go-To Security Buddy for Node.js
Cover image for Introducing SmartScanner: Your Go-To Security Buddy for Node.js

Introducing SmartScanner: Your Go-To Security Buddy for Node.js

1
Comments
4 min read
Secrets Management Best Practices for Team Collaboration
Cover image for Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
What is a Smurf Attack?

What is a Smurf Attack?

1
Comments
4 min read
How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

How to Protect Your Web App from Common Security Vulnerabilities (XSS, CSRF, SQL Injection)

Comments
2 min read
Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Setting Up an Nginx Reverse Proxy with an Authentication System (NestJS Example)

Comments
3 min read
Essential Security Best Practices for Ruby on Rails

Essential Security Best Practices for Ruby on Rails

15
Comments 2
10 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
Looking for potential vulnerabilities in code, part 2: practice

Looking for potential vulnerabilities in code, part 2: practice

Comments 2
14 min read
Top Hacking Gadgets for 2025 - @verylazytech

Top Hacking Gadgets for 2025 - @verylazytech

7
Comments
1 min read
How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?
Cover image for How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

Comments
2 min read
Enhancing Web Application Security with AES, RSA, and Hashing Techniques

Enhancing Web Application Security with AES, RSA, and Hashing Techniques

Comments
4 min read
Talos Linux Part 2: Meet Omni – The Managed Kubernetes Platform Powered by Talos

Talos Linux Part 2: Meet Omni – The Managed Kubernetes Platform Powered by Talos

2
Comments
4 min read
Level Up Your AWS Security: A Detailed Prioritized Checklist from the Trenches

Level Up Your AWS Security: A Detailed Prioritized Checklist from the Trenches

1
Comments
4 min read
Introducción a Amazon GuardDuty: Generar hallazgos de prueba
Cover image for Introducción a Amazon GuardDuty: Generar hallazgos de prueba

Introducción a Amazon GuardDuty: Generar hallazgos de prueba

5
Comments
3 min read
Building Scalable PHP Applications: Best Practices for Performance and Security

Building Scalable PHP Applications: Best Practices for Performance and Security

4
Comments 2
3 min read
Data Privacy in the API Economy: Balancing Innovation with Security
Cover image for Data Privacy in the API Economy: Balancing Innovation with Security

Data Privacy in the API Economy: Balancing Innovation with Security

16
Comments 1
6 min read
Tech innovator

Tech innovator

Comments
1 min read
Setting up TLS connection for containerized PostgreSQL database

Setting up TLS connection for containerized PostgreSQL database

4
Comments
4 min read
Authentication and Authorization Best Practices
Cover image for Authentication and Authorization Best Practices

Authentication and Authorization Best Practices

Comments
3 min read
Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Homomorphic Encryption: Unlocking Privacy Without Losing Utility

Comments
3 min read
Compliance Tools for Cloud Environments

Compliance Tools for Cloud Environments

1
Comments
4 min read
loading...