DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Secure Shell, Real Power: A Developer’s Guide to SSH

Secure Shell, Real Power: A Developer’s Guide to SSH

1
Comments 1
8 min read
TIL: How I Set Up My DEV Blog

TIL: How I Set Up My DEV Blog

Comments
1 min read
🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

🧠 Think Before You Click: Real-Life Phishing Attacks You Should Know 👀

12
Comments 3
2 min read
Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Puppet Security Compliance Management (SCM) 3.5.0 and Puppet Comply 2.25.0 are now available!

Comments
2 min read
AWS Certificate Manager Now Offers Exportable Public Certificates

AWS Certificate Manager Now Offers Exportable Public Certificates

Comments
2 min read
What is HashId? Why Should Developers Use HashId to Secure APIs?

What is HashId? Why Should Developers Use HashId to Secure APIs?

Comments
4 min read
Automated Kubernetes Governance with Kyverno and Slack Alerts

Automated Kubernetes Governance with Kyverno and Slack Alerts

5
Comments
6 min read
Under the Hood: Chronos Vault's Triple-Chain Defense System Explained

Under the Hood: Chronos Vault's Triple-Chain Defense System Explained

1
Comments 1
5 min read
🧪 Test Automation Meetup – July 2025 Securing APIs and Empowering QA with Human-AI Hybrid

🧪 Test Automation Meetup – July 2025 Securing APIs and Empowering QA with Human-AI Hybrid

Comments
1 min read
Why Your NodeJs/NestJS JWT Authentication is Probably Broken

Why Your NodeJs/NestJS JWT Authentication is Probably Broken

2
Comments 3
9 min read
How to Install Wiz with Sveltos: A Smarter Way to Automate Multi-Cluster Security on AKS

How to Install Wiz with Sveltos: A Smarter Way to Automate Multi-Cluster Security on AKS

Comments
3 min read
Fake Job Offers Are Turning GitHub Repos Into a Trap

Fake Job Offers Are Turning GitHub Repos Into a Trap

3
Comments
5 min read
Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

Preparing for the Quantum Leap: The Urgency of Post-Quantum Cryptography

3
Comments
7 min read
🛡️ OWASP Top 10 (2021 Edition) — Explained

🛡️ OWASP Top 10 (2021 Edition) — Explained

3
Comments
1 min read
Revolutionizing DevSecOps: How AI is Reshaping Software Security

Revolutionizing DevSecOps: How AI is Reshaping Software Security

1
Comments
6 min read
Why HTTPS Is Just HTTP with a Cool Hoodie and Bodyguards.

Why HTTPS Is Just HTTP with a Cool Hoodie and Bodyguards.

1
Comments
4 min read
Security news weekly round-up - 11th July 2025

Security news weekly round-up - 11th July 2025

1
Comments
3 min read
2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

2.3.2 - 2.3.5 Concepts (System Performance Brendan Gregg 2nd)

10
Comments
5 min read
2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

2.2 - 2.3.2 Models/Concepts (System Performance Brendan Gregg 2nd)

10
Comments
7 min read
⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators

⏱️ Time Tracking for Teachers in Oldenburg – A Long-Overdue Step Toward Relieving Educators

13
Comments
3 min read
Setting up an airgapped LLM using Ollama

Setting up an airgapped LLM using Ollama

2
Comments
4 min read
Container security at scale: Building untrusted images safely

Container security at scale: Building untrusted images safely

Comments 1
6 min read
DNS records for Mail Server

DNS records for Mail Server

Comments
1 min read
How LayerX Achieves “Painless” Governance and Security 🛡️ in the Cloud ☁️

How LayerX Achieves “Painless” Governance and Security 🛡️ in the Cloud ☁️

6
Comments
4 min read
The Telegram Username Scam: How People Are Losing Thousands in TON

The Telegram Username Scam: How People Are Losing Thousands in TON

10
Comments 10
7 min read
loading...