DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

18
Comments 2
9 min read
Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace

Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace

7
Comments
5 min read
Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Comments
3 min read
What if we improve the way developers are given access to databases

What if we improve the way developers are given access to databases

Comments
4 min read
Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Comments
2 min read
HTML Decode vs HTML Encode – Complete Guide

HTML Decode vs HTML Encode – Complete Guide

1
Comments
2 min read
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

9
Comments
5 min read
Setting Up PostgreSQL in Docker on Hetzner with SSL Certificates from Certbot

Setting Up PostgreSQL in Docker on Hetzner with SSL Certificates from Certbot

Comments
7 min read
Cloud, Edge, or Local: Choosing the Right Architecture for Smart Security Cameras

Cloud, Edge, or Local: Choosing the Right Architecture for Smart Security Cameras

Comments
2 min read
Namespaces and Policy: Inside the Micro‑MCP Gateway

Namespaces and Policy: Inside the Micro‑MCP Gateway

Comments
4 min read
Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Comments
4 min read
Alpacon: Network Access and Resource Management (Part 1)

Alpacon: Network Access and Resource Management (Part 1)

Comments
2 min read
Implementing Identity and Access Management (IAM) on Jenkins Using the Role-Based Strategy Plugin

Implementing Identity and Access Management (IAM) on Jenkins Using the Role-Based Strategy Plugin

2
Comments
5 min read
Fortifying Web Security: Ensuring Secure Data Transmission

Fortifying Web Security: Ensuring Secure Data Transmission

Comments
1 min read
Cloud vs Edge vs Local Architecture for Security Camera

Cloud vs Edge vs Local Architecture for Security Camera

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.