DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Authentication and authorization : difference

Authentication and authorization : difference

Comments
2 min read
Kinde new features in August

Kinde new features in August

1
Comments
1 min read
Security news weekly round-up - 3rd October 2025

Security news weekly round-up - 3rd October 2025

2
Comments
3 min read
Docker Series: Episode 23 — Docker Swarm Advanced: Services, Secrets & Configs 🔐

Docker Series: Episode 23 — Docker Swarm Advanced: Services, Secrets & Configs 🔐

7
Comments
2 min read
Why Confidential Smart Contracts Matter

Why Confidential Smart Contracts Matter

3
Comments 2
2 min read
Symmetric vs Asymmetric Encryption — Explained Clearly

Symmetric vs Asymmetric Encryption — Explained Clearly

1
Comments
4 min read
Adding Rate Limiting to Your .NET Web API

Adding Rate Limiting to Your .NET Web API

5
Comments
2 min read
🌍 The Dark Side of Connectivity in a Digital Age

🌍 The Dark Side of Connectivity in a Digital Age

Comments
2 min read
Secure SSH Shell Applications

Secure SSH Shell Applications

1
Comments
4 min read
Short-lived GitHub Access Token for secure local development by ghtkn

Short-lived GitHub Access Token for secure local development by ghtkn

1
Comments
3 min read
Private LLM Inference: Democratizing AI with Ciphertext Computations

Private LLM Inference: Democratizing AI with Ciphertext Computations

1
Comments
2 min read
Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan

Unlocking LLM Power: Secure and Cost-Effective Inference for Everyone by Arvind Sundararajan

1
Comments
2 min read
The Dark Reality of Open Source: Why Developers Must Rethink 'Free Software'

The Dark Reality of Open Source: Why Developers Must Rethink 'Free Software'

1
Comments
3 min read
30D2R - August: Active Directory

30D2R - August: Active Directory

Comments
3 min read
Audio Deepfakes: The Achilles' Heel of AI Voice Security by Arvind Sundararajan

Audio Deepfakes: The Achilles' Heel of AI Voice Security by Arvind Sundararajan

1
Comments
2 min read
Stop leaking .env files - try Secretsnap (free CLI)

Stop leaking .env files - try Secretsnap (free CLI)

6
Comments 1
1 min read
Sentinel Chip: Real-Time AI Defense Against Embedded System Attacks

Sentinel Chip: Real-Time AI Defense Against Embedded System Attacks

1
Comments
2 min read
Outil de Cybersécurité du Jour - Aug 31, 2025

Outil de Cybersécurité du Jour - Aug 31, 2025

1
Comments
3 min read
Unlocking LLMs: Secure, Efficient Inference for Everyone

Unlocking LLMs: Secure, Efficient Inference for Everyone

1
Comments
2 min read
Using OIDC with .NET to connect to MongoDB Atlas

Using OIDC with .NET to connect to MongoDB Atlas

1
Comments
10 min read
Bug Bounty Dex223

Bug Bounty Dex223

Comments
3 min read
Secure AWS Access in Kubernetes: Transitioning from Secrets to IRSA or Pod Identity

Secure AWS Access in Kubernetes: Transitioning from Secrets to IRSA or Pod Identity

4
Comments
6 min read
Compliance in the Cloud Isn’t a Checkbox

Compliance in the Cloud Isn’t a Checkbox

Comments
2 min read
AWS Networking: SSL/TLS with Load Balancers

AWS Networking: SSL/TLS with Load Balancers

2
Comments
3 min read
Secure Coding guidelines

Secure Coding guidelines

Comments
4 min read
loading...