DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Deploying a Secure LEMP Stack on Stack on Linux (Week 1)

Deploying a Secure LEMP Stack on Stack on Linux (Week 1)

Comments
5 min read
DevOpsDays Prague 2025

DevOpsDays Prague 2025

15
Comments 6
4 min read
How to Secure a Website with a Free SSL Certificate (Let's Encrypt)

How to Secure a Website with a Free SSL Certificate (Let's Encrypt)

Comments
4 min read
🔐 How to Remove Access Keys from Your AWS Root Account

🔐 How to Remove Access Keys from Your AWS Root Account

2
Comments
2 min read
The Surprisingly Hilarious World of Tech Vocabulary : Socket Edition 🔌😵‍💫

The Surprisingly Hilarious World of Tech Vocabulary : Socket Edition 🔌😵‍💫

Comments
2 min read
Single Sign-On with OpenAM and OpenIG: Practical Implementation Examples

Single Sign-On with OpenAM and OpenIG: Practical Implementation Examples

Comments
4 min read
Melhores práticas de segurança com o GitHub Copilot

Melhores práticas de segurança com o GitHub Copilot

7
Comments
3 min read
Understanding Port 443: The Backbone of HTTPS Explained

Understanding Port 443: The Backbone of HTTPS Explained

1
Comments
5 min read
5 Prompts That Make Any AI App More Secure

5 Prompts That Make Any AI App More Secure

16
Comments 1
3 min read
Managing Secrets in PCI-DSS Compliant Docker Environments: Techniques and Tools for Secure Handling

Managing Secrets in PCI-DSS Compliant Docker Environments: Techniques and Tools for Secure Handling

1
Comments
3 min read
Digital Defense Revolution: How Modern Security Landscapes Are Transforming in 2025

Digital Defense Revolution: How Modern Security Landscapes Are Transforming in 2025

5
Comments 1
7 min read
Securing Microservices with JWT Validation at the Nginx Proxy Layer

Securing Microservices with JWT Validation at the Nginx Proxy Layer

3
Comments
5 min read
Social Media Widgets and Privacy

Social Media Widgets and Privacy

12
Comments 3
5 min read
The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

4
Comments 2
7 min read
CyberVault: A Fully Local, Open-Source Password Manager Built with C#

CyberVault: A Fully Local, Open-Source Password Manager Built with C#

Comments
1 min read
Lift and Slide Doors — Innovative Solutions for Comfort and Security

Lift and Slide Doors — Innovative Solutions for Comfort and Security

3
Comments
2 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js

Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js

1
Comments
3 min read
Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

Comments
8 min read
9 Free Web App Vulnerability Scanners You Should Know in 2025

9 Free Web App Vulnerability Scanners You Should Know in 2025

1
Comments
4 min read
TiEcon 2025: Cultivating Cultural Capital in the Age of AI

TiEcon 2025: Cultivating Cultural Capital in the Age of AI

Comments
4 min read
Hardening Docker Images for PCI-DSS Compliance: Practical Strategies for Secure Builds

Hardening Docker Images for PCI-DSS Compliance: Practical Strategies for Secure Builds

3
Comments
3 min read
Understanding PCI-DSS in Docker: Laying the Foundation for Secure Containerized Payment Systems

Understanding PCI-DSS in Docker: Laying the Foundation for Secure Containerized Payment Systems

1
Comments
3 min read
Dev Challenge

Dev Challenge

Comments
1 min read
Understanding Worms in Cybersecurity

Understanding Worms in Cybersecurity

1
Comments
9 min read
Understanding Rootkits: Definition, Detection, Removal, and Prevention

Understanding Rootkits: Definition, Detection, Removal, and Prevention

Comments
6 min read
loading...