DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Access Token & Refresh Token: A Breakdown

Access Token & Refresh Token: A Breakdown

1
Comments
2 min read
Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

Enhancing The Security of Your Web Application with Azure Network Security Groups and Application Security Groups (Part 2)

6
Comments
4 min read
Why we built Resourcely

Why we built Resourcely

2
Comments
6 min read
Securing Your Azure Web Application with Azure Firewall (Part 3)

Securing Your Azure Web Application with Azure Firewall (Part 3)

5
Comments
3 min read
Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

Isolate and Connect Your Applications with Azure Virtual Networks and Subnets (Part 1)

4
Comments
3 min read
Configuring Routes for a Web Application using Azure Firewall (Part 4)

Configuring Routes for a Web Application using Azure Firewall (Part 4)

Comments
2 min read
SCA vs SAST - Security Tools Comparison 🛡️

SCA vs SAST - Security Tools Comparison 🛡️

3
Comments
6 min read
Simple OAuth 2.0 Framework for Authentication (Freeware)

Simple OAuth 2.0 Framework for Authentication (Freeware)

Comments
1 min read
Issue 53 of AWS Cloud Security Weekly

Issue 53 of AWS Cloud Security Weekly

4
Comments
1 min read
Understanding Adversarial Attacks on LLMs, AAAL Pt.1

Understanding Adversarial Attacks on LLMs, AAAL Pt.1

6
Comments
2 min read
Deep Dive into Elastic Cloud Enterprise (ECE)

Deep Dive into Elastic Cloud Enterprise (ECE)

5
Comments
8 min read
Spring Security Oauth2 Password JPA Implementation

Spring Security Oauth2 Password JPA Implementation

2
Comments
1 min read
Exporting private keys in plang programming language

Exporting private keys in plang programming language

Comments
3 min read
Top 10 Types of Cyber attacks

Top 10 Types of Cyber attacks

2
Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.