DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Adding Security Headers on Cloudflare

Adding Security Headers on Cloudflare

Comments
3 min read
The Hidden Risks of "Secure by Default": Why Security Contexts in Kubernetes Matter

The Hidden Risks of "Secure by Default": Why Security Contexts in Kubernetes Matter

Comments
6 min read
Why DevSecOps Isn't a Role. It's a Responsibility

Why DevSecOps Isn't a Role. It's a Responsibility

Comments
4 min read
🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

🛡️ What Makes Linux Secure (and Where It's Weak - Plus How to Fix It)

Comments
3 min read
Penetration Testing vs. Red Teaming

Penetration Testing vs. Red Teaming

Comments
4 min read
Understanding Authentication Types: The Complete Developer's Guide

Understanding Authentication Types: The Complete Developer's Guide

Comments
4 min read
Cryptography for developers

Cryptography for developers

Comments
3 min read
🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

🛡️ JWT Industry Conventions: Best Practices and Standards for Secure Token Design

Comments
3 min read
Why JWT login breaks in WooCommerce — and how to fix it cleanly

Why JWT login breaks in WooCommerce — and how to fix it cleanly

Comments
2 min read
Rethinking Security Resilience And Getting Back To Basics At CornCon 11

Rethinking Security Resilience And Getting Back To Basics At CornCon 11

1
Comments
8 min read
Bracing for Breakers: Quantum-Safe Crypto for the Real World

Bracing for Breakers: Quantum-Safe Crypto for the Real World

Comments
2 min read
🏪 Day 26 of #30DaysOfSolidity — Build a Decentralized NFT Marketplace with Royalties 💎

🏪 Day 26 of #30DaysOfSolidity — Build a Decentralized NFT Marketplace with Royalties 💎

Comments
5 min read
Why the Model Context Protocol is the Future of AI Integration

Why the Model Context Protocol is the Future of AI Integration

Comments
8 min read
How to use authentication using Athentication Kit

How to use authentication using Athentication Kit

Comments
3 min read
Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

Semgrep Newsletter | 30, 300, 3000, MCP, and Gartner

1
Comments 1
5 min read
Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Y2Q: Are Your Systems Ready for the Quantum Apocalypse?

Comments
2 min read
Engineering Trust in 2025: A Developer’s Field Guide to Credible Information

Engineering Trust in 2025: A Developer’s Field Guide to Credible Information

Comments
5 min read
PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

PGDN Sentinel — an OSS security toolkit for Sui validators, inside Discord

Comments
3 min read
Dirty COW exploit that broke linux in 2016

Dirty COW exploit that broke linux in 2016

Comments
2 min read
How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

How We Mathematically Verified 73 Security Properties in Chronos Vault Trinity Protocol™

4
Comments
5 min read
🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

🏦 Day 24 of #30DaysOfSolidity — Build a Secure Conditional Payments (Escrow) System in Solidity

1
Comments
4 min read
How to use JWTokens properly

How to use JWTokens properly

Comments
3 min read
Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Binary Brains: Secure AI on the Edge with In-Memory Magic by Arvind Sundararajan

Comments
2 min read
MVP Conf 2025 - OWASP API Security Top 10

MVP Conf 2025 - OWASP API Security Top 10

Comments
3 min read
eBPF Tutorial: Privilege Escalation via File Content Manipulation

eBPF Tutorial: Privilege Escalation via File Content Manipulation

Comments
7 min read
loading...