DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Docker Swarm vs Kubernetes - A Deep Technical Analysis

Docker Swarm vs Kubernetes - A Deep Technical Analysis

5
Comments
7 min read
Introducing Altikrity: A Multi-Layer Encryption Library

Introducing Altikrity: A Multi-Layer Encryption Library

Comments
2 min read
Enhancing the Efficacy of Mobile Banking with AI-Powered Testing

Enhancing the Efficacy of Mobile Banking with AI-Powered Testing

Comments
4 min read
Code Smell 284 - Encrypted Functions

Code Smell 284 - Encrypted Functions

Comments
5 min read
Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Things About Nonce & CSRF Token: Differences, Use Cases, and How They Work

Comments
5 min read
Unit tests so you don't lose your levitating plant

Unit tests so you don't lose your levitating plant

Comments
3 min read
What is AWS Lightsail? - A DevOps Engineer's Perspective

What is AWS Lightsail? - A DevOps Engineer's Perspective

5
Comments
6 min read
Giới thiệu căn bản về thư viện JasperReports

Giới thiệu căn bản về thư viện JasperReports

Comments
7 min read
WRITE-UP ASCIS 2023

WRITE-UP ASCIS 2023

Comments
6 min read
What You Need to Know Before Creating Your Own Stablecoin

What You Need to Know Before Creating Your Own Stablecoin

2
Comments
4 min read
Code Quality in the Cloud

Code Quality in the Cloud

Comments
6 min read
Defending Yourself From DDoS Attacks - An Essential Guide

Defending Yourself From DDoS Attacks - An Essential Guide

Comments
2 min read
Microsoft 365 Data at Risk? Best Office 365 Backup Solutions for Enhanced Security

Microsoft 365 Data at Risk? Best Office 365 Backup Solutions for Enhanced Security

Comments
4 min read
Streamlining AWS Security Hub and Policy Management for Organizations with Terraform

Streamlining AWS Security Hub and Policy Management for Organizations with Terraform

1
Comments
5 min read
How to get into your CMS when you've locked the keys in your car.

How to get into your CMS when you've locked the keys in your car.

1
Comments
2 min read
Security news weekly round-up - 20th December 2024

Security news weekly round-up - 20th December 2024

1
Comments
3 min read
OAuth2 and PKCE: Enhancing Security for Public Clients

OAuth2 and PKCE: Enhancing Security for Public Clients

Comments
3 min read
User-level auth in your Supabase API - Supaweek Day 2

User-level auth in your Supabase API - Supaweek Day 2

Comments
4 min read
Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Elevate Your API Security with Fine-Grained Authorization from Zuplo + OktaFGA

Comments
4 min read
Zero Downtime migration of API Authentication

Zero Downtime migration of API Authentication

Comments
4 min read
Adding API Key Authentication to a Firestore API

Adding API Key Authentication to a Firestore API

Comments
12 min read
Day 5 - Announcing v2 of react-api-key-manager

Day 5 - Announcing v2 of react-api-key-manager

Comments
1 min read
Day 1 - Introducing the ZAPI Management API

Day 1 - Introducing the ZAPI Management API

Comments
3 min read
Why Zuplo Has the Best Damn Rate Limiter on the Planet

Why Zuplo Has the Best Damn Rate Limiter on the Planet

Comments
2 min read
Integrating Clerk With Zuplo For Seamless API Authentication

Integrating Clerk With Zuplo For Seamless API Authentication

Comments
6 min read
Using PropelAuth to secure your API at the Gateway

Using PropelAuth to secure your API at the Gateway

Comments
3 min read
Rebuttal: API keys can do everything

Rebuttal: API keys can do everything

Comments
7 min read
Adding Developer Portal Access and Request Validation to a Firestore API

Adding Developer Portal Access and Request Validation to a Firestore API

Comments
7 min read
Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Auth Pricing Wars: Cognito vs Auth0 vs Firebase vs Supabase

Comments
7 min read
Tips and Best Practices for API Authentication

Tips and Best Practices for API Authentication

Comments
10 min read
Simple HTTP Authentication: A Beginner’s Guide

Simple HTTP Authentication: A Beginner’s Guide

Comments
9 min read
Build a Virtual Private Cloud

Build a Virtual Private Cloud

Comments
1 min read
What are API Subaccounts?

What are API Subaccounts?

Comments
3 min read
Hacking Python functions by changing their source code

Hacking Python functions by changing their source code

Comments
2 min read
Rate Limiting OpenAI Requests with an API Gateway

Rate Limiting OpenAI Requests with an API Gateway

Comments
4 min read
Day 2 - Announcing our Open-Source React Component

Day 2 - Announcing our Open-Source React Component

Comments
7 min read
Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Seeing an API Rate Limit Exceeded error? Here's How to Fix It!

Comments
9 min read
A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

A Developer's Take on Cerbos: The Smarter Way to Handle Authorization

Comments
6 min read
How to Download and Install FortiClient VPN for Your Windows PC

How to Download and Install FortiClient VPN for Your Windows PC

1
Comments
1 min read
How to evaluate the safety and security of LLM Applications?

How to evaluate the safety and security of LLM Applications?

Comments
1 min read
The Quest to Minimize False Positives Reaches Another Significant Milestone

The Quest to Minimize False Positives Reaches Another Significant Milestone

Comments
4 min read
findElement and findElements in Selenium: Use Cases with Examples

findElement and findElements in Selenium: Use Cases with Examples

Comments
3 min read
Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Securing a Web Application on Google Cloud Platform: Best Practices and Implementation

Comments
4 min read
OS Security & Encryption: Protect Your Data Like a Pro! 🔐

OS Security & Encryption: Protect Your Data Like a Pro! 🔐

Comments
2 min read
AI Security System for Businesses: A Must-Have Checklist

AI Security System for Businesses: A Must-Have Checklist

Comments
7 min read
Optimize Time-To-First-Call with API key auth

Optimize Time-To-First-Call with API key auth

Comments
5 min read
Backend for Frontend (BFF) Authentication

Backend for Frontend (BFF) Authentication

Comments
5 min read
BSides Austin 2024: Balancing AI Safety and Real-World Risks

BSides Austin 2024: Balancing AI Safety and Real-World Risks

7
Comments 1
6 min read
The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

The Hidden Challenges of Automating Secrets Rotation: Why Automatic Credential Rotation Isn’t a One-Click Solution

Comments
8 min read
Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

Understanding Privilege Escalation in Linux: Threats, Techniques, and Prevention

6
Comments
2 min read
Why Security Testing is a Must-Have for Fintech Success

Why Security Testing is a Must-Have for Fintech Success

Comments
4 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

𝐒𝐈𝐄𝐌 𝐄𝐱𝐩𝐥𝐚𝐢𝐧𝐞𝐝: 𝐖𝐡𝐚𝐭 𝐈𝐭 𝐈𝐬 𝐚𝐧𝐝 𝐖𝐡𝐲 𝐈𝐭’𝐬 𝐂𝐫𝐢𝐭𝐢𝐜𝐚𝐥 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲?

5
Comments
2 min read
Password Hashing in Python

Password Hashing in Python

Comments
1 min read
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies

Comments
1 min read
Your rich text could be a cross-site scripting vulnerability

Your rich text could be a cross-site scripting vulnerability

Comments
8 min read
Centralized Root Access in AWS: A Game-Changer for LandingZone security

Centralized Root Access in AWS: A Game-Changer for LandingZone security

3
Comments
3 min read
Master Docker Secrets: Securely Managing Sensitive Data

Master Docker Secrets: Securely Managing Sensitive Data

1
Comments
2 min read
Protect Your API Gateway with AWS WAF using CDK

Protect Your API Gateway with AWS WAF using CDK

Comments
5 min read
Two-Factor Authentication System

Two-Factor Authentication System

Comments
1 min read
loading...