DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Splunk Dashboards

Splunk Dashboards

Comments
4 min read
The Elegant Art of Killing 'unsafe-inline' in Your CSP

The Elegant Art of Killing 'unsafe-inline' in Your CSP

Comments
4 min read
Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Mastering Patch Management in OT, Overcoming Obstacles with Precision Solutions

Comments
6 min read
Infineon Technologies: Pioneering Security, Sustainability, and Open Innovation

Infineon Technologies: Pioneering Security, Sustainability, and Open Innovation

1
Comments
8 min read
LLM App Security: Risk & Prevent for GenAI Development

LLM App Security: Risk & Prevent for GenAI Development

9
Comments
12 min read
Code Security for Developers: How to Write & Review Code Securely

Code Security for Developers: How to Write & Review Code Securely

1
Comments 1
5 min read
How We Helped Teams Remediate 95% of Container CVEs Without Code Changes

How We Helped Teams Remediate 95% of Container CVEs Without Code Changes

6
Comments 1
2 min read
Easy and secure MCP servers, now on Windows

Easy and secure MCP servers, now on Windows

4
Comments 3
2 min read
Reglas administradas AWS WAF Owasp Top Ten

Reglas administradas AWS WAF Owasp Top Ten

3
Comments 2
7 min read
Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

Dumping Credentials with Python: Automating LSASS Access and Credential Extraction Post-Exploitation

6
Comments
4 min read
World Password Day

World Password Day

1
Comments
2 min read
Como contive um ataque DDoS em produção com Nginx + Cloudflare

Como contive um ataque DDoS em produção com Nginx + Cloudflare

2
Comments
2 min read
Revolutionizing DevSecOps: AI for Intelligent Security from Code to Cloud

Revolutionizing DevSecOps: AI for Intelligent Security from Code to Cloud

2
Comments 1
6 min read
Access Control

Access Control

Comments
3 min read
Understanding AWS RAM: Benefits and Use Cases

Understanding AWS RAM: Benefits and Use Cases

5
Comments 1
1 min read
From Unknown to Verified: Solving the MCP Server Trust Problem

From Unknown to Verified: Solving the MCP Server Trust Problem

10
Comments
6 min read
What do hackers know about your website?

What do hackers know about your website?

Comments
2 min read
Is GitHub Sponsors Safe? A Comprehensive Guide

Is GitHub Sponsors Safe? A Comprehensive Guide

1
Comments
8 min read
Optimizing Docker Images: Reducing Size and Improving Security

Optimizing Docker Images: Reducing Size and Improving Security

3
Comments 1
5 min read
Online privacy isn’t niche anymore - it’s global.

Online privacy isn’t niche anymore - it’s global.

Comments
2 min read
HOW TO CREATE AND CONFIGURE AZURE FIREWALL

HOW TO CREATE AND CONFIGURE AZURE FIREWALL

Comments
4 min read
Building a Reverse Shell in Rust Using PEB Techniques

Building a Reverse Shell in Rust Using PEB Techniques

1
Comments
2 min read
Mastering External API Usage in Angular Interceptors with x-api-key

Mastering External API Usage in Angular Interceptors with x-api-key

Comments
4 min read
Achieve Highest level of security with BoldSign’s QES Compliance

Achieve Highest level of security with BoldSign’s QES Compliance

5
Comments
3 min read
Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

Choosing Between JWKS and Token Introspection for OAuth 2.0 Token Validation

3
Comments
4 min read
loading...