Security for the Rest of Us

Essential security guides and best practices for developers

No image available

🛌 What Is Data at Rest? Securing Stored Information with Encryption

Learn what data at rest is, why it’s a prime target for attackers, and how to protect stored data using AES encryption, cloud tools, and key management best practices.

·5 min read
Data Protection
No image available

🚊 What Is Data in Transit? Why It Matters and How to Secure It

Learn what data in transit really means, why it's vulnerable during transfer, and how developers can secure it with HTTPS and TLS from day one.

·5 min read
Data Protection
No image available

🚰 How to Make Sure Your App Isn't Leaking Sensitive Data

A 10-step post-deployment security checklist for developers to prevent leaks and secure apps—plus a free Notion checklist to make it simple.

·5 min read
Deployments
No image available

🛡️ Understanding Authentication vs. Authorization for New Developers

Learn the difference between authentication and authorization for secure app development. Simple guide for new developers.

·5 min read
Encryption
No image available

🤖 Simplify Database Security with Supabase's RLS AI Assistant

Supabase's RLS AI Assistant simplifies database security by translating plain English requests into security policies, making implementation easy and efficient.

·5 min read
AI
No image available

📝 What New Developers Should Know About Content Security Policy (CSP)

Learn the basics of Content Security Policy (CSP) for beginners. Protect your site from attacks with simple, effective security practices.

·5 min read
Basics
No image available

🔒 Top 5 Coding Practices to Secure Your Data

Learn 5 essential coding practices to secure your data, explained for beginners. Prevent breaches and protect users with simple security steps.

·5 min read
Best Practice
No image available

🚨 10 Critical Security Mistakes Developers Make That Lead to Data Breaches

10 common security mistakes developers make and how to avoid them to protect your apps and user data effectively.

·5 min read
Coding
This site uses cookies for analytics. We respect Do Not Track settings.