DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

File Ownership in Linux: Mastering chown, chgrp, and Recursive Changes

Comments
7 min read
Kubernetes validating admission policy and admission binding

Kubernetes validating admission policy and admission binding

1
Comments
3 min read
Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

Beyond finding: Remediating CVE-2025-55182 across hundreds of repositories with Ona Automations

8
Comments 2
5 min read
Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

Catch vulnerabilities before they ship: local SonarQube setup (Part 2)

1
Comments
8 min read
Building a Production-Ready A2A Protocol Agent: A Technical Journey

Building a Production-Ready A2A Protocol Agent: A Technical Journey

1
Comments
4 min read
Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

Terraform Basics – Week 4: Securing Your Azure VM's with NSGs and Dynamic Blocks

2
Comments
6 min read
Keeping Your Health Data Out of Court

Keeping Your Health Data Out of Court

Comments
5 min read
😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

😈 Dare to Commit Secrets to GitHub? With SOPS & GPG, I Do! 🤫

12
Comments 2
3 min read
How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

How to Enable Google Authenticator for SSH Login on Linux: Step-by-Step Guide

Comments
5 min read
Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Building Trust in DeFi: A Deep Dive into Musical Chairs' Time-Locked Emergency Functions

Comments
4 min read
Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Are You Seeing Fake Bot Traffic Spikes in Analytics from China and Singapore? Here’s How to Stop It

Comments
3 min read
Common WordPress Vulnerabilities: A Complete Security Guide

Common WordPress Vulnerabilities: A Complete Security Guide

Comments
9 min read
YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

YubiKey vs Virtual MFA: The Data-Driven Decision for Root Account Security

4
Comments
6 min read
10 Common Supabase Security Misconfigurations (and How to Fix Them)

10 Common Supabase Security Misconfigurations (and How to Fix Them)

1
Comments
6 min read
Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Boosting Security Excellence: How OKRs Drive Results in Application Security and DevSecOps

Comments
6 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.