DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Understanding CSRF Attacks: Process, Risks, and Protection

Understanding CSRF Attacks: Process, Risks, and Protection

Comments
4 min read
I rolled my own auth

I rolled my own auth

4
Comments 2
1 min read
Windows Device Management: Streamline Your IT Operations

Windows Device Management: Streamline Your IT Operations

Comments
5 min read
SSH Authentication Key Rotation: Why and How to Expire SSH Keys

SSH Authentication Key Rotation: Why and How to Expire SSH Keys

8
Comments
4 min read
The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

The 10 Most Common DevOps Mistakes (And How to Avoid Them in 2025)

11
Comments 2
3 min read
Outtake: Revolutionizing Threat Detection with GPT-4.1

Outtake: Revolutionizing Threat Detection with GPT-4.1

Comments 1
3 min read
CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

CSPM Cloud Security: Your Ultimate Guide to Protecting Multi-Cloud Infrastructure in 2025

1
Comments
1 min read
Authenticate GitHub Actions to Azure using OpenID Connect

Authenticate GitHub Actions to Azure using OpenID Connect

1
Comments
4 min read
Startup Life: From DevOps to Filling Out Compliance Spreadsheets

Startup Life: From DevOps to Filling Out Compliance Spreadsheets

1
Comments
3 min read
Secure Your Spring Boot API with JWT and Role-Based Authorization

Secure Your Spring Boot API with JWT and Role-Based Authorization

Comments
5 min read
Terraforming the Cloud

Terraforming the Cloud

16
Comments 13
2 min read
Devil Lies in the details - How not to join an AD!

Devil Lies in the details - How not to join an AD!

3
Comments
3 min read
Unlocking AWS KMS: The Security Professional's Guide to Encryption

Unlocking AWS KMS: The Security Professional's Guide to Encryption

Comments
4 min read
🔐 Authentication vs Authorization

🔐 Authentication vs Authorization

Comments
1 min read
Six Hat Analysis for Personal Data Security

Six Hat Analysis for Personal Data Security

1
Comments
4 min read
Creating a Kinde workflow to check for malicious IPs during authentication

Creating a Kinde workflow to check for malicious IPs during authentication

10
Comments
6 min read
OpenID: A Comprehensive Guide to Secure Online Authentication

OpenID: A Comprehensive Guide to Secure Online Authentication

1
Comments
3 min read
⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

⚠️ I Leaked an API Key While Screen Sharing. This Chrome Extension Would've Saved Me.

10
Comments 5
1 min read
Managing Service Accounts in Multicluster Environments with RHACM

Managing Service Accounts in Multicluster Environments with RHACM

Comments
7 min read
🚨 Stop Using ChatGPT Agents Until You Read This First!

🚨 Stop Using ChatGPT Agents Until You Read This First!

38
Comments 7
4 min read
How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

How I Hacked a Hacker – Part 2: The Hunt Begins (Real-Life Story)

10
Comments 2
6 min read
Using chroot to Restrict Linux Applications for Enhanced Security

Using chroot to Restrict Linux Applications for Enhanced Security

1
Comments
4 min read
AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

AWS IAM Management Best Practices: Structured Approaches for Scalable Access Control

Comments
3 min read
How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

How I Built a Hardened Amazon Linux 2 AMI with EC2 Image Builder

Comments
1 min read
Assessing Security Risks of Open Source Repos

Assessing Security Risks of Open Source Repos

Comments
2 min read
loading...