DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Backend Engineer's Guide to Not Getting Hacked

A Backend Engineer's Guide to Not Getting Hacked

Comments
9 min read
🔐 Are Your Passwords Ready for the Quantum Age?

🔐 Are Your Passwords Ready for the Quantum Age?

1
Comments
2 min read
"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

"End-to-End SonarQube Integration with GitLab CI/CD for DevSecOps Pipelines"

Comments
1 min read
No More Sneaky Uploads : How I Made My Node.js App Virus-Free🛡️🦠

No More Sneaky Uploads : How I Made My Node.js App Virus-Free🛡️🦠

Comments
1 min read
Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Cybr - [LAB] [Challenge] Create a VPC with public and private subnets

Comments
9 min read
Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

Instantly Verify Faces & Liveness with One API — Identity Checks Made Simple with AI

11
Comments 1
2 min read
🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

🔒 Understanding Uniface's "partner" Modifier: Controlling Component Visibility

Comments
2 min read
Level Up Your NGINX Skills with These 6 Configurations

Level Up Your NGINX Skills with These 6 Configurations

4
Comments
4 min read
Security news weekly round-up - 18th July 2025

Security news weekly round-up - 18th July 2025

1
Comments
5 min read
🔥 The Agent Registry Is a Trojan Horse

🔥 The Agent Registry Is a Trojan Horse

8
Comments 1
2 min read
Secure SSH Access with Modular Policy Files

Secure SSH Access with Modular Policy Files

1
Comments
5 min read
Top 10 Web Application Penetration Testing Tools

Top 10 Web Application Penetration Testing Tools

1
Comments 2
9 min read
Provide shared file storage for the company offices

Provide shared file storage for the company offices

Comments
5 min read
How Hackers Are Using AI in 2025 (Urgent Attention)

How Hackers Are Using AI in 2025 (Urgent Attention)

6
Comments 1
6 min read
How to setup Corporate Identity Access at scale in AWS?

How to setup Corporate Identity Access at scale in AWS?

Comments
5 min read
Top Apple Device Management Software for 2025 | Easy & Secure

Top Apple Device Management Software for 2025 | Easy & Secure

Comments
4 min read
Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep

Mastering Docker from Scratch to Scale – A Hands-On Guide with Labs, CI/CD, Security & DCA Prep

Comments
2 min read
Sessions vs JWTs: Not Just Two Ways to Authenticate

Sessions vs JWTs: Not Just Two Ways to Authenticate

Comments 1
4 min read
Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Forensic Walkthrough: Decoding the ResupplyFi Attack Contract

Comments
3 min read
Protect your instances from attackers! Install Portsentry

Protect your instances from attackers! Install Portsentry

3
Comments
14 min read
Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js: script-src and connect-src

Security - Solving the "Content Security Policy (CSP) Header Not Set" in Next.js: script-src and connect-src

1
Comments
3 min read
A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

A Summer of Security: How Google’s AI-Led Cybersecurity Push Is Changing the Game

5
Comments
4 min read
Why Enterprise Risk Management Must Include Secure Translation

Why Enterprise Risk Management Must Include Secure Translation

9
Comments
3 min read
Challenge: Upload File Path Traversal

Challenge: Upload File Path Traversal

Comments 2
3 min read
Why Your CI Pipeline Needs Network Security (And How We Built It)

Why Your CI Pipeline Needs Network Security (And How We Built It)

Comments
3 min read
loading...