DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats

12
Comments
4 min read
When cert-manager meets essendi xc

When cert-manager meets essendi xc

1
Comments
5 min read
Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

Build a Safe and Simple Login System Using PHP and MySQL – A Complete Step-by-Step Tutorial "

1
Comments
2 min read
🐕 shortio — Secure Links for the Right People, Every Time

🐕 shortio — Secure Links for the Right People, Every Time

38
Comments
2 min read
Safe Data Practices for AI Training & Inference | AI Security series

Safe Data Practices for AI Training & Inference | AI Security series

1
Comments 2
3 min read
Scrapebase + Permit.io: Web Scraping with Authorization

Scrapebase + Permit.io: Web Scraping with Authorization

152
Comments 26
5 min read
Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions

Claiming Custody: A Real-World, Hands-On Guide to Linux File & Directory Ownership and Permissions

6
Comments
5 min read
02: Create and configure network security groups

02: Create and configure network security groups

6
Comments
3 min read
JSX Curly Braces {} Got Your Back Behind the Scenes

JSX Curly Braces {} Got Your Back Behind the Scenes

1
Comments
2 min read
Exercise 03: Create and configure Azure Firewall

Exercise 03: Create and configure Azure Firewall

5
Comments
2 min read
🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH

🔐 How to Set Up Multi-Factor Authentication (MFA) on Ubuntu for SSH

2
Comments 1
4 min read
EXPOSED! The Authorization Blind Spot!

EXPOSED! The Authorization Blind Spot!

6
Comments
5 min read
SkyRulers – AI-Powered Drone Parts Ordering with Fine-Grained Access Control

SkyRulers – AI-Powered Drone Parts Ordering with Fine-Grained Access Control

25
Comments
3 min read
Secure by design in Python: A FastAPI app with 5 DevSecOps tools and a real time SSTI vulnerability remediation

Secure by design in Python: A FastAPI app with 5 DevSecOps tools and a real time SSTI vulnerability remediation

1
Comments
3 min read
The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

The Ultimate 5-Step Guide: Mastering Ethical Hacking Techniques for Security

1
Comments
5 min read
Linux System Hardening: Essential Security Practices for Servers

Linux System Hardening: Essential Security Practices for Servers

Comments
7 min read
Security news weekly round-up - 9th May 2025

Security news weekly round-up - 9th May 2025

1
Comments
4 min read
Smart Doctor: AI-Powered Medical Assistant with Human-in-the-Loop Access Control using Permit.io- Permissions Redefined

Smart Doctor: AI-Powered Medical Assistant with Human-in-the-Loop Access Control using Permit.io- Permissions Redefined

23
Comments 2
4 min read
🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

🔐 The Role of AES in Blockchain: Securing Off-Chain Data with Symmetric Encryption

Comments
12 min read
🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

🧩 Preguntas sobre desarrollo web general. (Comparte tu conocimiento)

1
Comments
1 min read
AuthClinic: A Unified Access Control Demo for Healthcare Applications

AuthClinic: A Unified Access Control Demo for Healthcare Applications

16
Comments
3 min read
Microsoft Entra ID: Implementing Advanced Rights Management

Microsoft Entra ID: Implementing Advanced Rights Management

Comments
2 min read
Permitron: AI-Powered Task Management with Fine-Grained Permissions

Permitron: AI-Powered Task Management with Fine-Grained Permissions

14
Comments
4 min read
The Inflation of "Security Researchers" and Its Consequences for Open Source

The Inflation of "Security Researchers" and Its Consequences for Open Source

Comments
6 min read
How to Generate an AI SBOM, and What Tools to Use

How to Generate an AI SBOM, and What Tools to Use

25
Comments 3
5 min read
loading...