DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
[SECURITY IN RAILS] Preventing enumeration attacks, data leaks, and timing based attacks 🔐🛤️

[SECURITY IN RAILS] Preventing enumeration attacks, data leaks, and timing based attacks 🔐🛤️

12
Comments 2
7 min read
Securing LLM Function-Calling: Risks & Mitigations for AI Agents

Securing LLM Function-Calling: Risks & Mitigations for AI Agents

8
Comments 1
17 min read
The Hacker’s New Assistant: How AI is supercharging Cyber crime In 2025

The Hacker’s New Assistant: How AI is supercharging Cyber crime In 2025

Comments
8 min read
AWS WAF: A Comprehensive Guide to Web Application Protection

AWS WAF: A Comprehensive Guide to Web Application Protection

1
Comments 1
9 min read
🔐 AIsecTest Bridge: Building Trustworthy and Inclusive Digital Security with AWS

🔐 AIsecTest Bridge: Building Trustworthy and Inclusive Digital Security with AWS

Comments
2 min read
IT Hardware Asset Management Best Practices for Lifecycle Tracking

IT Hardware Asset Management Best Practices for Lifecycle Tracking

5
Comments
12 min read
You've leaked a secret in your git repository - now what?

You've leaked a secret in your git repository - now what?

1
Comments 2
12 min read
Which Authentication Method Would You Choose for Your Website in 2025?

Which Authentication Method Would You Choose for Your Website in 2025?

Comments
2 min read
DevOps Reimagined: From Jenkins to AIOps and the Rise of Intelligent Automation – Part II

DevOps Reimagined: From Jenkins to AIOps and the Rise of Intelligent Automation – Part II

Comments
3 min read
อุตสาหกรรมความปลอดภัยทางไซเบอร์ (Cybersecurity Industry)

อุตสาหกรรมความปลอดภัยทางไซเบอร์ (Cybersecurity Industry)

Comments 1
1 min read
GenAI's Ethical Imperative: Building Robust Data Governance Frameworks

GenAI's Ethical Imperative: Building Robust Data Governance Frameworks

Comments 1
6 min read
MongoDB Access Control: Creating Secure Users with Custom Roles

MongoDB Access Control: Creating Secure Users with Custom Roles

1
Comments 1
3 min read
AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

AuthSync – A Passwordless, Cross-Device Authentication System (Inspired by WhatsApp Web & FIDO2)

1
Comments 1
2 min read
Everything You Need to Know About SQL Server 2022 Enterprise Core - 2 Core License Pack

Everything You Need to Know About SQL Server 2022 Enterprise Core - 2 Core License Pack

1
Comments
4 min read
Integrating Keycloak with Angular and Spring Boot: Complete Guide

Integrating Keycloak with Angular and Spring Boot: Complete Guide

3
Comments 1
1 min read
Questions for React job interview

Questions for React job interview

Comments
1 min read
AI & No-Code/Low-Code: Revolutionizing Enterprise Development with Intelligent Citizen Developers

AI & No-Code/Low-Code: Revolutionizing Enterprise Development with Intelligent Citizen Developers

Comments 1
6 min read
QuCode - 21DaysChallenge - Day 16

QuCode - 21DaysChallenge - Day 16

Comments 1
1 min read
Why I Quit Development to Break Into Cybersecurity

Why I Quit Development to Break Into Cybersecurity

62
Comments 17
4 min read
Beyond Crypto: The Rise of Real-World Asset Tokenization

Beyond Crypto: The Rise of Real-World Asset Tokenization

Comments 1
9 min read
Web Application Threat Hunting!

Web Application Threat Hunting!

6
Comments
1 min read
Deploying a Secure LEMP Stack on Stack on Linux (Week 1)

Deploying a Secure LEMP Stack on Stack on Linux (Week 1)

Comments
5 min read
DevOpsDays Prague 2025

DevOpsDays Prague 2025

15
Comments 6
4 min read
How to Secure a Website with a Free SSL Certificate (Let's Encrypt)

How to Secure a Website with a Free SSL Certificate (Let's Encrypt)

Comments
4 min read
🔐 How to Remove Access Keys from Your AWS Root Account

🔐 How to Remove Access Keys from Your AWS Root Account

2
Comments
2 min read
loading...