DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Which LLMs Are (and Aren't) Ready for Secure Code?

Which LLMs Are (and Aren't) Ready for Secure Code?

20
Comments
3 min read
Securing APIs with Two-Factor Authentication

Securing APIs with Two-Factor Authentication

Comments
12 min read
Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Here's How Developers Can Ensure Sensitive Data Does Not Accidentally Reach Another Device

Comments
2 min read
🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.

🚀🚀Setting Up AWS Firewall Manager Used For Auditing Security Groups in AWS Organization accounts.

1
Comments
8 min read
🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

🛡️ SAST & DAST in GitLab CI/CD: Automate Your App Security the Smart Way

Comments
1 min read
Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Unlocking the Power of SARIF: The Backbone of Modern Static Analysis

Comments
3 min read
No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

No Dockerfile? No problem! Running Node and Python MCPs with ToolHive

4
Comments
2 min read
How to Use .env Securely in DevOps Projects

How to Use .env Securely in DevOps Projects

6
Comments
2 min read
🔒 Bandit: Python Static Application Security Testing Guide

🔒 Bandit: Python Static Application Security Testing Guide

1
Comments 1
3 min read
🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

🧬 Introducing UserDNA.js: A Lightweight Browser Fingerprinting Library

Comments
2 min read
How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

How I Made My SaaS "Students Only" Without School IDs Using WHOIS and GPT

Comments
2 min read
Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

Why Security Is Non-Negotiable in Crypto (And What Happens When You Cut Corners)

14
Comments 3
3 min read
Best DAM Software for Organizing Media on NAS (2025 Guide)

Best DAM Software for Organizing Media on NAS (2025 Guide)

Comments
4 min read
Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Secrets Management & Zero-Trust Architecture for Web3-Grade Security

Comments
1 min read
Why can deleted files be recovered?

Why can deleted files be recovered?

Comments
5 min read
Penetration Testing for API Security: Protecting Digital Gateways

Penetration Testing for API Security: Protecting Digital Gateways

3
Comments
12 min read
How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

How VirusTotal Can Protect You from Phishing, Malware, and Dangerous Links

Comments
2 min read
Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

Announcing the LLM Security Leaderboard: Evaluating AI Models Through a Security Lens

15
Comments
2 min read
2-Factor Authentication OTP: TOTP & HOTP Algorithms

2-Factor Authentication OTP: TOTP & HOTP Algorithms

Comments
6 min read
MCP Is Rewriting the Rules of API Integration

MCP Is Rewriting the Rules of API Integration

6
Comments
8 min read
The Security Crisis: How Tanzu Spring Is Changing the Game

The Security Crisis: How Tanzu Spring Is Changing the Game

3
Comments
3 min read
Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Introducing PyEYE: A Powerful Tool for Extracting Endpoints and Paths

Comments
1 min read
The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

The Differences Between HTTP vs HTTPS: A Complete Guide for WordPress Users

Comments
4 min read
Understanding NACLs with AWS EC2 instances 🚀

Understanding NACLs with AWS EC2 instances 🚀

5
Comments
6 min read
Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

Securing Configurations: Managing ConfigMaps and Secrets in Kubernetes

1
Comments
2 min read
loading...