DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Cybersecurity Weekly#12: What Developers Should Care About This Week

Cybersecurity Weekly#12: What Developers Should Care About This Week

1
Comments
2 min read
🔐 Building an IAM Security Dashboard with Power BI (Beginner-Friendly Walkthrough)

🔐 Building an IAM Security Dashboard with Power BI (Beginner-Friendly Walkthrough)

Comments
7 min read
I Built a Cybersecurity Programming Language in Go (Cyber+)

I Built a Cybersecurity Programming Language in Go (Cyber+)

Comments
1 min read
A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

A Simple Overview of Passwords, 2FA, and Passkeys (Bite-size Article)

Comments
3 min read
I built a website security scanner (because I kept shipping insecure projects)

I built a website security scanner (because I kept shipping insecure projects)

Comments
2 min read
From MVP to Scale: Automated Security Testing for Every Startup Stage

From MVP to Scale: Automated Security Testing for Every Startup Stage

Comments
4 min read
Computer Systems Security An Introduction (Part 1)

Computer Systems Security An Introduction (Part 1)

Comments
2 min read
Microsoft Purview no Ignite 2025: segurança de dados integrada para a era de IA e agentes

Microsoft Purview no Ignite 2025: segurança de dados integrada para a era de IA e agentes

Comments
6 min read
Zero Trust Architecture: Why “Trust No One” Is the Future of Security 🔐

Zero Trust Architecture: Why “Trust No One” Is the Future of Security 🔐

Comments
3 min read
Pen Testing IoT Devices

Pen Testing IoT Devices

Comments
8 min read
Why Do Networks Even Work Correctly?

Why Do Networks Even Work Correctly?

Comments
3 min read
AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

AWS SERVICES SPOTLIGHT : CLOUDHSM (HARDWARD SECURITY MODULE)

Comments
1 min read
Endpoint Detection & Response (EDR)

Endpoint Detection & Response (EDR)

Comments
6 min read
Explorando el paralelismo real: Python 3.14 (No-GIL) y Rust

Explorando el paralelismo real: Python 3.14 (No-GIL) y Rust

Comments
11 min read
From Regex Matching to Understanding Intent: How SafeLine WAF Uses Semantic Analysis

From Regex Matching to Understanding Intent: How SafeLine WAF Uses Semantic Analysis

Comments
4 min read
Small Startup Security Case Study: How SafeLine WAF Helped a SaaS Team Stop Bot Abuse Without Breaking User Experience

Small Startup Security Case Study: How SafeLine WAF Helped a SaaS Team Stop Bot Abuse Without Breaking User Experience

Comments
3 min read
Micro-SaaS in the Real World: Stopping Fake Signups with Nginx + SafeLine WAF (No DevOps Required)

Micro-SaaS in the Real World: Stopping Fake Signups with Nginx + SafeLine WAF (No DevOps Required)

Comments
3 min read
Startup Security Case Study: How a Lean E-Commerce SaaS Used SafeLine WAF to Stop Price Tampering and Bot Traffic

Startup Security Case Study: How a Lean E-Commerce SaaS Used SafeLine WAF to Stop Price Tampering and Bot Traffic

Comments
2 min read
Form Security Best Practices: Protecting Your Web Forms from Attacks

Form Security Best Practices: Protecting Your Web Forms from Attacks

Comments
14 min read
When a seemingly innoffensive conversation with AI turns malicious

When a seemingly innoffensive conversation with AI turns malicious

Comments
2 min read
From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

From Detection to Defense: How Push-to-Vault Supercharges Secrets Management for DevSecOps

Comments
7 min read
How SafeLine WAF Saved a Fast-Growing E-Commerce Platform from Persistent Web Attacks

How SafeLine WAF Saved a Fast-Growing E-Commerce Platform from Persistent Web Attacks

5
Comments
3 min read
Why Identity Is Mission-Critical in AI-to-AI Systems

Why Identity Is Mission-Critical in AI-to-AI Systems

Comments
2 min read
Policy and Authorization, The Second Gate in Zero Trust

Policy and Authorization, The Second Gate in Zero Trust

Comments
2 min read
Why Rate Limiting Still Matters in AI-to-AI Systems

Why Rate Limiting Still Matters in AI-to-AI Systems

Comments
3 min read
loading...