DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Self-hosting GitLab Behind Cloudflare Zero Trust (A Practical DevOps Lab)

Self-hosting GitLab Behind Cloudflare Zero Trust (A Practical DevOps Lab)

Comments
2 min read
Humans Can’t Post Here… Only AI Agents (Moltbook Explained)

Humans Can’t Post Here… Only AI Agents (Moltbook Explained)

1
Comments
1 min read
Automated Vulnerability Scanning for AWS Lambda with Amazon Inspector

Automated Vulnerability Scanning for AWS Lambda with Amazon Inspector

Comments
1 min read
Built a Python Dependency Audit Tool Because Vulnerability Lists Weren’t Enough

Built a Python Dependency Audit Tool Because Vulnerability Lists Weren’t Enough

1
Comments
2 min read
How to Back Up Your Discord Server in 2026 (The Complete Guide)

How to Back Up Your Discord Server in 2026 (The Complete Guide)

Comments
8 min read
Browser Fingerprinting Explained: How Websites Track You Without Cookies

Browser Fingerprinting Explained: How Websites Track You Without Cookies

Comments
8 min read
Basics about SAML/SSO with ADLAP

Basics about SAML/SSO with ADLAP

Comments 1
1 min read
A Developer’s Guide to Detecting AI-Generated Images

A Developer’s Guide to Detecting AI-Generated Images

Comments
3 min read
I Built a Free Tool to Find Quantum-Vulnerable Cryptography in Your Code

I Built a Free Tool to Find Quantum-Vulnerable Cryptography in Your Code

Comments
1 min read
Rage GBA Engine on macOS: When Gatekeeper Silently Kills the Launch

Rage GBA Engine on macOS: When Gatekeeper Silently Kills the Launch

Comments
3 min read
Stop Blaming AWS Defaults for Your Misconfigurations

Stop Blaming AWS Defaults for Your Misconfigurations

2
Comments
4 min read
SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist

SAST vs DAST vs (IAST/RASP): Quick AppSec Checklist

6
Comments 3
1 min read
What actually gets exploited in penetration tests

What actually gets exploited in penetration tests

Comments
2 min read
Beyond Firewalls: How AWS WAF Becomes Your First Line of Cloud Defense

Beyond Firewalls: How AWS WAF Becomes Your First Line of Cloud Defense

1
Comments
4 min read
Designing a Production-Grade API Control Layer

Designing a Production-Grade API Control Layer

Comments
1 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.