DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Best Practices for Mastering Cloud Security on AWS

Best Practices for Mastering Cloud Security on AWS

Comments
1 min read
HTTP/2 Hypercorn Configuration for your FastAPI

HTTP/2 Hypercorn Configuration for your FastAPI

Comments
11 min read
Man-in-the-Middle Attacks Explained (And How to Stay Safe)

Man-in-the-Middle Attacks Explained (And How to Stay Safe)

7
Comments
3 min read
7 Tips for Securing Your DNS and Email Deliverability in Production

7 Tips for Securing Your DNS and Email Deliverability in Production

Comments
3 min read
Set Up AWS Alerts to catch Cost Spikes and Security Risks

Set Up AWS Alerts to catch Cost Spikes and Security Risks

3
Comments
6 min read
My Recent Debugging Adventure: The Case of the Disappearing Stylesheets

My Recent Debugging Adventure: The Case of the Disappearing Stylesheets

1
Comments
3 min read
Your Wildcard SSL Setup is a Security Nightmare (And You Don't Even Know It)

Your Wildcard SSL Setup is a Security Nightmare (And You Don't Even Know It)

2
Comments
4 min read
Outil de Cybersécurité du Jour - Sep 5, 2025

Outil de Cybersécurité du Jour - Sep 5, 2025

5
Comments
3 min read
Vulnerability Management Platforms: 8 New Tools for Enterprise-Scale Risk Assessment with Real-World Impact

Vulnerability Management Platforms: 8 New Tools for Enterprise-Scale Risk Assessment with Real-World Impact

Comments
8 min read
Cloud Security Posture Management: 5 Cutting-Edge CSPM Solutions Solving Multi-Cloud Compliance and Drift Nightmares

Cloud Security Posture Management: 5 Cutting-Edge CSPM Solutions Solving Multi-Cloud Compliance and Drift Nightmares

1
Comments
8 min read
How to Secure Your Headless WordPress & WPGraphQL API

How to Secure Your Headless WordPress & WPGraphQL API

Comments
3 min read
RAG Firewall: The missing retrieval-time security layer for LLMs (v0.4.1)

RAG Firewall: The missing retrieval-time security layer for LLMs (v0.4.1)

Comments
2 min read
Securing Your Data in PostgreSQL Using PG_TDE for Encryption – Beginner-Friendly Guide

Securing Your Data in PostgreSQL Using PG_TDE for Encryption – Beginner-Friendly Guide

Comments
7 min read
PKI 101: Why Public Key Infrastructure matters

PKI 101: Why Public Key Infrastructure matters

3
Comments
6 min read
Security news weekly round-up - 26th September 2025

Security news weekly round-up - 26th September 2025

1
Comments
3 min read
Applying Any SAST Tools for an Infrastructure as Code Application in Terraform

Applying Any SAST Tools for an Infrastructure as Code Application in Terraform

2
Comments
3 min read
How to set up a Raspberry Pi camera with Shinobi for reliable, 24/7 CCTV monitoring

How to set up a Raspberry Pi camera with Shinobi for reliable, 24/7 CCTV monitoring

2
Comments
5 min read
Applying Semgrep SAST to Any Application

Applying Semgrep SAST to Any Application

5
Comments
3 min read
Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures

Strengthening 🛡️ Brute Force Defense + Fallback Logs to Cover Data Loss in Case of Database Transaction Failures

6
Comments
2 min read
Infrastructure as Code Security: 6 Cutting-Edge Tools That Actually Catch Template Vulnerabilities Before They Wreck Your...

Infrastructure as Code Security: 6 Cutting-Edge Tools That Actually Catch Template Vulnerabilities Before They Wreck Your...

Comments
9 min read
When 'Helpful' Robots Go Haywire: A Subtle Security Threat

When 'Helpful' Robots Go Haywire: A Subtle Security Threat

1
Comments
2 min read
Indirect Prompt Injection: A New Security Concern in MCP Servers

Indirect Prompt Injection: A New Security Concern in MCP Servers

6
Comments
2 min read
Controlling and Securing Azure Storage Access: A Step-by-Step Guide

Controlling and Securing Azure Storage Access: A Step-by-Step Guide

1
Comments
5 min read
Patch Management vs Vulnerability Management: Why the Difference Matters

Patch Management vs Vulnerability Management: Why the Difference Matters

1
Comments
5 min read
The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan

The Invisible Fingerprint: Securing Industry 4.0 with Adaptive AI Watermarks by Arvind Sundararajan

1
Comments
2 min read
loading...