DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project

5
Comments 1
4 min read
𝗧𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝗽𝗽𝘀: 𝗔𝗜-𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗔𝗴𝗲𝗻𝘁𝘀, "𝗩𝗶𝗯𝗲-𝗖𝗼𝗱𝗶𝗻𝗴" 𝗜𝗻𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗼𝗿 "𝗦𝗶𝗻𝗴𝗹𝗲-𝗜𝗻𝗽𝘂𝘁" 𝗜𝗻𝘁𝗲𝗿𝗳𝗮𝗰𝗲𝘀?

𝗧𝗵𝗲 𝗙𝘂𝘁𝘂𝗿𝗲 𝗼𝗳 𝗔𝗽𝗽𝘀: 𝗔𝗜-𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗔𝗴𝗲𝗻𝘁𝘀, "𝗩𝗶𝗯𝗲-𝗖𝗼𝗱𝗶𝗻𝗴" 𝗜𝗻𝘀𝘁𝗮𝗯𝗶𝗹𝗶𝘁𝘆, 𝗼𝗿 "𝗦𝗶𝗻𝗴𝗹𝗲-𝗜𝗻𝗽𝘂𝘁" 𝗜𝗻𝘁𝗲𝗿𝗳𝗮𝗰𝗲𝘀?

4
Comments
2 min read
Configure a project and repository structure to support secure pipelines in Azure DevOps

Configure a project and repository structure to support secure pipelines in Azure DevOps

Comments
1 min read
𝗨𝗻𝗹𝗼𝗰𝗸 𝘁𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗦𝘄𝗮𝗴𝗴𝗲𝗿 𝘄𝗶𝘁𝗵 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗶𝗻 𝗦𝗽𝗿𝗶𝗻𝗴 𝗕𝗼𝗼𝘁! 🚀

𝗨𝗻𝗹𝗼𝗰𝗸 𝘁𝗵𝗲 𝗣𝗼𝘄𝗲𝗿 𝗼𝗳 𝗦𝘄𝗮𝗴𝗴𝗲𝗿 𝘄𝗶𝘁𝗵 𝗕𝗲𝗮𝗿𝗲𝗿 𝗧𝗼𝗸𝗲𝗻 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗶𝗻 𝗦𝗽𝗿𝗶𝗻𝗴 𝗕𝗼𝗼𝘁! 🚀

Comments
1 min read
Cloud vs. On-Prem Storage: The Hidden Costs No One Talks About

Cloud vs. On-Prem Storage: The Hidden Costs No One Talks About

2
Comments
3 min read
The Rising Threat of DDoS Attacks: What You Need to Know

The Rising Threat of DDoS Attacks: What You Need to Know

Comments
3 min read
AWS Cloud Security: Keeping Your Data Safe

AWS Cloud Security: Keeping Your Data Safe

Comments
2 min read
Securing My AWS EC2: A Journey Through IAM and SSH Struggles

Securing My AWS EC2: A Journey Through IAM and SSH Struggles

Comments
3 min read
Explorando e Mitigando XSS em Formulários com React e Node.js

Explorando e Mitigando XSS em Formulários com React e Node.js

Comments 1
3 min read
Building Secure Authentication in Go with GoFrame GToken 🔐

Building Secure Authentication in Go with GoFrame GToken 🔐

Comments
6 min read
A Tactical Overview of Penetration Testing: From Recon to Reporting

A Tactical Overview of Penetration Testing: From Recon to Reporting

Comments
1 min read
New Next.js Middleware Vulnerability – How Bad Is It?

New Next.js Middleware Vulnerability – How Bad Is It?

3
Comments
2 min read
Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

Navigating Brownfield Environments in AWS: Steps for Successful Cloud Use

2
Comments
7 min read
Edge Security Showdown: Vercel Firewall vs. Cloudflare - Protecting Your Modern Web App

Edge Security Showdown: Vercel Firewall vs. Cloudflare - Protecting Your Modern Web App

5
Comments
6 min read
Report Then Remove or Remove Then Report: How to Handle Scammers Effectively

Report Then Remove or Remove Then Report: How to Handle Scammers Effectively

Comments
2 min read
Coding on a Vibe? Why Skipping the Fundamentals Can Wreck Your Project

Coding on a Vibe? Why Skipping the Fundamentals Can Wreck Your Project

6
Comments
3 min read
Stop Storing Plain Text Passwords! Use Bcrypt for Security

Stop Storing Plain Text Passwords! Use Bcrypt for Security

Comments
2 min read
Rethinking the Operator Access Experience

Rethinking the Operator Access Experience

Comments
1 min read
High-Performance Secure Networking with RIOC

High-Performance Secure Networking with RIOC

Comments
13 min read
FB Marketplace Phishing Website Analysis

FB Marketplace Phishing Website Analysis

Comments
4 min read
🔐 Understanding SAML, OAuth 2.0 and OpenID Connect

🔐 Understanding SAML, OAuth 2.0 and OpenID Connect

2
Comments
5 min read
Security news weekly round-up - 28th March 2025

Security news weekly round-up - 28th March 2025

Comments
3 min read
Tutorial: How to Extract JWT Data

Tutorial: How to Extract JWT Data

Comments
1 min read
Understanding SSH Keys and EC2: A Complete Guide 🔐

Understanding SSH Keys and EC2: A Complete Guide 🔐

Comments
2 min read
Deploying nginx application with self signed certificates

Deploying nginx application with self signed certificates

Comments
1 min read