DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Mastering CORS with RESTful APIs: Configuration, Best Practices & Fixes

Comments
3 min read
Enhancing Open Source Security with Blockchain Technology: A New Frontier

Enhancing Open Source Security with Blockchain Technology: A New Frontier

Comments
2 min read
How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?

How did a cloud-native database company quickly achieve SOC 2 and GDPR certifications?

Comments
5 min read
How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

How Unix, Windows, and macOS Security Models Evolved Over Time and Their Impact Today

Comments
6 min read
Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

Kubernetes hardening made easy: Running CIS Benchmarks with kube-bench

3
Comments
6 min read
Access Control and Zero-Knowledge

Access Control and Zero-Knowledge

Comments
4 min read
Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Securing a Prankster Robot: Linux Security Strategies to Prevent Rogue AI

Comments
4 min read
🔒 7 Ways SQL Injections Destroy Your App

🔒 7 Ways SQL Injections Destroy Your App

Comments
5 min read
Fixing High and Critical Vulnerabilities in npm Using npm audit

Fixing High and Critical Vulnerabilities in npm Using npm audit

Comments
3 min read
Mitigating vs Eliminating Threats

Mitigating vs Eliminating Threats

Comments
2 min read
Security news weekly round-up - 28th February 2025

Security news weekly round-up - 28th February 2025

Comments
2 min read
How are Serverless and PaaS architectures different?

How are Serverless and PaaS architectures different?

Comments
4 min read
⚡ Secure your containers faster—without disrupting your workflow

⚡ Secure your containers faster—without disrupting your workflow

Comments
3 min read
Continuously patch GHCR images with Copacetic

Continuously patch GHCR images with Copacetic

Comments
3 min read
Does Patching Containers Feel Like Whack-a-Mole?

Does Patching Containers Feel Like Whack-a-Mole?

Comments
2 min read
GDPR-Compliant Logging: A JavaScript Developer’s Checklist

GDPR-Compliant Logging: A JavaScript Developer’s Checklist

Comments
21 min read
Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Unlocking Data Integration with Formata: 3 Game-Changing Benefits

Comments
1 min read
AI Security: The Next Frontier in Infrastructure Protection

AI Security: The Next Frontier in Infrastructure Protection

Comments
4 min read
ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

ROFL: Unlocking Secure Off-Chain Computation with Oasis Network

Comments
2 min read
Zero Trust Vs Principle of Least Privilege (PoLP)

Zero Trust Vs Principle of Least Privilege (PoLP)

Comments
5 min read
Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Trustless Agents and Secure Execution: Why Oasis's TEE is a Game Changer

Comments
2 min read
WP Query Functions – What to use and when

WP Query Functions – What to use and when

Comments
3 min read
The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

The Evolution Of Wireless Networking : A Deep Dive Into IEEE 802 Standards

Comments
4 min read
How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

How to Set Up SSH Key Authentication in Linux: A Step-by-Step Deep Dive

Comments
1 min read
Azure DevOps Security Best Practices

Azure DevOps Security Best Practices

Comments
14 min read
loading...