DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats

The Dangers of Oversharing: How Social Media Can Expose You to Cyber Threats

Comments
3 min read
Implementing Secure Single Sign-On Between Vue & NodeJs Applications

Implementing Secure Single Sign-On Between Vue & NodeJs Applications

Comments
9 min read
Why can deleted files be recovered?

Why can deleted files be recovered?

Comments
5 min read
WhoWeB Scanner - Simple Website Scanner Tool

WhoWeB Scanner - Simple Website Scanner Tool

Comments
1 min read
LAKASA-WIFI - Wi-Fi Connection Script

LAKASA-WIFI - Wi-Fi Connection Script

Comments
1 min read
Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Comments
1 min read
Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

1
Comments
2 min read
Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Secure Client-Side Encryption and Decryption with JavaScript: A Practical Guide

Comments
3 min read
Passkeys: Should You Build or Buy? A Practical Guide

Passkeys: Should You Build or Buy? A Practical Guide

Comments
3 min read
Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection

Addressing The Growing Challenge of Generic Secrets: Beyond GitHub's Push Protection

Comments
8 min read
Understanding Sessions and Tokens: A Deep Dive

Understanding Sessions and Tokens: A Deep Dive

Comments
3 min read
10 Game-Changing Strategies to Supercharge Your API Gateway Performance

10 Game-Changing Strategies to Supercharge Your API Gateway Performance

Comments
12 min read
Session Hijacking In the API Era: Your Complete Defense Strategy

Session Hijacking In the API Era: Your Complete Defense Strategy

Comments
11 min read
Protecting Sensitive Data in API Logs

Protecting Sensitive Data in API Logs

Comments
9 min read
How API Developers Can Use Edge Computing to Optimize API Performance

How API Developers Can Use Edge Computing to Optimize API Performance

Comments
12 min read
Token Expiry Best Practices

Token Expiry Best Practices

Comments
6 min read
How To Secure APIs from SQL Injection Vulnerabilities

How To Secure APIs from SQL Injection Vulnerabilities

Comments
13 min read
Defending Your API: Essential Strategies Against Brute Force Attacks

Defending Your API: Essential Strategies Against Brute Force Attacks

Comments
13 min read
Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks

Enhancing Your CI/CD Security: Tips and Techniques to Mitigate Risks

Comments
12 min read
12 Practices and Tools to Ensure API Security

12 Practices and Tools to Ensure API Security

Comments
13 min read
Protecting Your APIs from Insider Threats: The Access Control Playbook

Protecting Your APIs from Insider Threats: The Access Control Playbook

Comments
10 min read
Zero Trust API Security: Never Trust, Always Protect

Zero Trust API Security: Never Trust, Always Protect

Comments
10 min read
Automating My Web App Deployment with AWS CI/CD

Automating My Web App Deployment with AWS CI/CD

3
Comments
6 min read
Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

Securing Your API With OAuth 2.0: A Developer's Guide to Robust Authentication

1
Comments
13 min read
Mastering XSS Prevention: Tips for Developers

Mastering XSS Prevention: Tips for Developers

Comments
12 min read
loading...