DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

8
Comments
2 min read
Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

4
Comments
5 min read
🚨 Monitoring in 2025: 6 Rules That Saved My Projects

🚨 Monitoring in 2025: 6 Rules That Saved My Projects

Comments
1 min read
Top 6 BoldSign Features That Make E-Signatures Effortless

Top 6 BoldSign Features That Make E-Signatures Effortless

3
Comments
4 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

Comments
3 min read
Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

1
Comments
5 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

1
Comments
4 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

Comments
2 min read
How to Protect the SafeLine Management Interface

How to Protect the SafeLine Management Interface

5
Comments
1 min read
Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Breaking The Unbreakable: Bypassing Arkose Labs on iOS

Comments
7 min read
Wazuh: Your Open-Source Security Superhero

Wazuh: Your Open-Source Security Superhero

Comments
3 min read
Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Catching Secrets Early: A Lightweight Build-Time Tripwire for Vite

Comments
4 min read
Go & AES-GCM: A Security Deep Dive

Go & AES-GCM: A Security Deep Dive

Comments
4 min read
What is Rate Limiting and How to Add It in Django

What is Rate Limiting and How to Add It in Django

1
Comments
2 min read
💀 MaskGod: The Final Boss of URL Masking 🕶️

💀 MaskGod: The Final Boss of URL Masking 🕶️

11
Comments 4
2 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

Inside AWS S3 API Calls: Creating a Go-Based HTTPS Traffic Inspector

11
Comments 4
11 min read
What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

What is TLS and How to Enforce TLS 1.2 or Above Using SafeLine

6
Comments
3 min read
loading...