DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT)

1
Comments
10 min read
🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

🧠 Understanding Proof of Work (PoW) vs Proof of Stake (PoS) — The Heartbeat of Blockchain

5
Comments
3 min read
Mastering Role-Based Access Control in Your Javascript CMS

Mastering Role-Based Access Control in Your Javascript CMS

3
Comments
6 min read
Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

Building a Privacy-First Log Analyzer for Banking QA: The Technical Architecture

18
Comments 2
9 min read
Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace

Building APIs with a Zero Trust Policy: Protecting Your Data Like Your Peace

7
Comments
5 min read
Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Introdução ao AWS IAM: Gestão de Identidades e Permissões na Nuvem

Comments
3 min read
What if we improve the way developers are given access to databases

What if we improve the way developers are given access to databases

Comments
4 min read
Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Detecting File Changes in 2 Seconds: Python File Integrity Monitoring

Comments
2 min read
HTML Decode vs HTML Encode – Complete Guide

HTML Decode vs HTML Encode – Complete Guide

1
Comments
2 min read
GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

GMX V1 Exploit Analysis: How a $42M Classic Reentrancy Attack Unfolded

9
Comments
5 min read
Setting Up PostgreSQL in Docker on Hetzner with SSL Certificates from Certbot

Setting Up PostgreSQL in Docker on Hetzner with SSL Certificates from Certbot

Comments
7 min read
Cloud, Edge, or Local: Choosing the Right Architecture for Smart Security Cameras

Cloud, Edge, or Local: Choosing the Right Architecture for Smart Security Cameras

Comments
2 min read
Namespaces and Policy: Inside the Micro‑MCP Gateway

Namespaces and Policy: Inside the Micro‑MCP Gateway

Comments
4 min read
Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Real-World Vulnerability Trends: What Security Teams Need to Watch in 2025

Comments
4 min read
Alpacon: Network Access and Resource Management (Part 1)

Alpacon: Network Access and Resource Management (Part 1)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.