DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protecting our EKS Nodes with Wazuh

Protecting our EKS Nodes with Wazuh

1
Comments
7 min read
What is Google AP2 Protocol : Step by Step Guide with Examples

What is Google AP2 Protocol : Step by Step Guide with Examples

Comments
5 min read
Secure Your Spring API With JWT and MongoDB

Secure Your Spring API With JWT and MongoDB

1
Comments
13 min read
SERVER ADMINISTRATION IN REAL LIFE: LINUX, WINDOWS, AND THE QUIET ART OF KEEPING THINGS UP

SERVER ADMINISTRATION IN REAL LIFE: LINUX, WINDOWS, AND THE QUIET ART OF KEEPING THINGS UP

Comments
5 min read
Examining the impact of npm supply chain attacks on MCP

Examining the impact of npm supply chain attacks on MCP

3
Comments
3 min read
If You Have a Single Mum - Read This

If You Have a Single Mum - Read This

3
Comments 1
10 min read
The next step in privacy: A messenger that doesn't send data and doesn't keep your secrets. 🚀

The next step in privacy: A messenger that doesn't send data and doesn't keep your secrets. 🚀

9
Comments
5 min read
Outil de Cybersécurité du Jour - Sep 18, 2025

Outil de Cybersécurité du Jour - Sep 18, 2025

5
Comments
3 min read
Parámetro de seguridad/estabilidad con PNPM

Parámetro de seguridad/estabilidad con PNPM

1
Comments
2 min read
Best 5 Tools to Help Eliminate CVEs from Container Images

Best 5 Tools to Help Eliminate CVEs from Container Images

Comments
4 min read
How to Secure Your Forgot Password Endpoint (Best Practices for Developers)

How to Secure Your Forgot Password Endpoint (Best Practices for Developers)

Comments
3 min read
Seguridad y Compliance en Shopify: Protegiendo tu Tienda y Datos de Clientes

Seguridad y Compliance en Shopify: Protegiendo tu Tienda y Datos de Clientes

Comments
2 min read
BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

BlueTeamCon 2025: Finding new approaches to security that don’t let perfect stand in the way of better

Comments
7 min read
How to set up a Raspberry Pi camera with Shinobi for reliable, 24/7 CCTV monitoring

How to set up a Raspberry Pi camera with Shinobi for reliable, 24/7 CCTV monitoring

Comments
5 min read
🔐 Breaking Down Identity, Authentication, Authorization & SSO

🔐 Breaking Down Identity, Authentication, Authorization & SSO

Comments
3 min read
What is Security Patching and Why is it Essential for Businesses?

What is Security Patching and Why is it Essential for Businesses?

Comments
3 min read
Balancing Cloud Migration with Strong Cybersecurity – What’s Your Approach?

Balancing Cloud Migration with Strong Cybersecurity – What’s Your Approach?

Comments
1 min read
Why Magento 2 Security Patches Are Not Optional for Enterprise Stores

Why Magento 2 Security Patches Are Not Optional for Enterprise Stores

Comments
5 min read
Access Control in Web Apps: Backend + Frontend

Access Control in Web Apps: Backend + Frontend

Comments
5 min read
The End of .env Chaos: Introducing EnvShield

The End of .env Chaos: Introducing EnvShield

1
Comments
3 min read
Deploy Vaultwarden on Nanocl

Deploy Vaultwarden on Nanocl

10
Comments
5 min read
CMK: The Master Key to Your AWS Encryption Kingdom

CMK: The Master Key to Your AWS Encryption Kingdom

1
Comments
4 min read
SQL Server Ledger Tables: Complete Guide with Banking Example

SQL Server Ledger Tables: Complete Guide with Banking Example

Comments
3 min read
API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

1
Comments
3 min read
Top Dependency Scanners: A Comprehensive Guide

Top Dependency Scanners: A Comprehensive Guide

Comments
6 min read
loading...