DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Firebase authentication - Best practices for password requirements
Cover image for Firebase authentication - Best practices for password requirements

Firebase authentication - Best practices for password requirements

Comments
1 min read
Automate AWS Landing Zone Deployment
Cover image for Automate AWS Landing Zone Deployment

Automate AWS Landing Zone Deployment

Comments
9 min read
What is MACsec, and why is it important?
Cover image for What is MACsec, and why is it important?

What is MACsec, and why is it important?

7
Comments 1
7 min read
Don't use JWT for Authorization!
Cover image for Don't use JWT for Authorization!

Don't use JWT for Authorization!

20
Comments 11
5 min read
Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Mastering Key Vaults - Securing Quella’s Sensitive Assets Like a Pro

Comments
7 min read
Stop AI coding assistants from leaking your secrets

Stop AI coding assistants from leaking your secrets

5
Comments
1 min read
Docker Scout: Your Container Security Companion - A Developer's Guide
Cover image for Docker Scout: Your Container Security Companion - A Developer's Guide

Docker Scout: Your Container Security Companion - A Developer's Guide

3
Comments 1
3 min read
Master Linux File Types While Your Coffee Brews
Cover image for Master Linux File Types While Your Coffee Brews

Master Linux File Types While Your Coffee Brews

4
Comments
5 min read
Implementing passwordless sign-in flow with email in Cognito

Implementing passwordless sign-in flow with email in Cognito

4
Comments
5 min read
Are millions of accounts vulnerable due to Google's OAuth Flaw?
Cover image for Are millions of accounts vulnerable due to Google's OAuth Flaw?

Are millions of accounts vulnerable due to Google's OAuth Flaw?

11
Comments 1
9 min read
Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):
Cover image for Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Cybersecurity Challenges in AI-Powered Medical Devices (SaMD):

Comments
4 min read
Building Secure and Scalable Fintech Applications: A Technical Architecture Deep Dive
Cover image for Building Secure and Scalable Fintech Applications: A Technical Architecture Deep Dive

Building Secure and Scalable Fintech Applications: A Technical Architecture Deep Dive

1
Comments 1
5 min read
Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze
Cover image for Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze

Debugging Authorization: How Cerbos Makes Troubleshooting Access Issues a Breeze

9
Comments 1
6 min read
How to Create a Workspace in Metasploit Console
Cover image for How to Create a Workspace in Metasploit Console

How to Create a Workspace in Metasploit Console

Comments
1 min read
Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?
Cover image for Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

Làm thế nào để quản lý secrets hiệu quả trên nhiều nền tảng chỉ với một công cụ?

1
Comments
4 min read
Pushed Authorization Requests in .NET 9: Why and How to Use Them
Cover image for Pushed Authorization Requests in .NET 9: Why and How to Use Them

Pushed Authorization Requests in .NET 9: Why and How to Use Them

7
Comments
8 min read
Confidence in the cloud with data sovereignty

Confidence in the cloud with data sovereignty

Comments
3 min read
Issue 79 of AWS Cloud Security Weekly
Cover image for Issue 79 of AWS Cloud Security Weekly

Issue 79 of AWS Cloud Security Weekly

1
Comments
1 min read
Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

Fixes for a critical rsync vulnerability (CVE-2024-12084) have been released for Stable/Bookworm, Testing and Unstable....

2
Comments
1 min read
Microsoft Security: A Comprehensive Approach to Digital Protection
Cover image for Microsoft Security: A Comprehensive Approach to Digital Protection

Microsoft Security: A Comprehensive Approach to Digital Protection

1
Comments
3 min read
Securely access Amazon EKS with GitHub Actions and OpenID Connect
Cover image for Securely access Amazon EKS with GitHub Actions and OpenID Connect

Securely access Amazon EKS with GitHub Actions and OpenID Connect

7
Comments
3 min read
Secrets Management in Kubernetes: Best Practices for Security
Cover image for Secrets Management in Kubernetes: Best Practices for Security

Secrets Management in Kubernetes: Best Practices for Security

13
Comments
6 min read
HashiCorp Vault Setup Guide for NEAR Protocol Accounts
Cover image for HashiCorp Vault Setup Guide for NEAR Protocol Accounts

HashiCorp Vault Setup Guide for NEAR Protocol Accounts

Comments
4 min read
Top 7 Kubernetes Certifications in 2025
Cover image for Top 7 Kubernetes Certifications in 2025

Top 7 Kubernetes Certifications in 2025

2
Comments
2 min read
Closing the PKIX Working Group is, apparently, not news
Cover image for Closing the PKIX Working Group is, apparently, not news

Closing the PKIX Working Group is, apparently, not news

Comments
2 min read
loading...