DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
🏁 From Code to Cloud: My DevOps + DevSecOps Journey (Part 4/4 - The Reflection and Possible Routes)

🏁 From Code to Cloud: My DevOps + DevSecOps Journey (Part 4/4 - The Reflection and Possible Routes)

2
Comments 1
3 min read
Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Comments
4 min read
How to set up Single Sign-On in AWS (IAM Identity Center)

How to set up Single Sign-On in AWS (IAM Identity Center)

2
Comments
4 min read
Using AI to build an AI Security Product

Using AI to build an AI Security Product

Comments
2 min read
Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

4
Comments
2 min read
Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

2
Comments
3 min read
Building an Enterprise Data Access Layer: The Foundation

Building an Enterprise Data Access Layer: The Foundation

2
Comments
2 min read
🚨 Building an IOC Triage Pipeline with Suricata + ML + Docker

🚨 Building an IOC Triage Pipeline with Suricata + ML + Docker

2
Comments
2 min read
How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

Comments
2 min read
How to Maintain Compliance and Security in Finance

How to Maintain Compliance and Security in Finance

Comments
2 min read
Enhancing Security in Apps Script

Enhancing Security in Apps Script

1
Comments
3 min read
🛡️ Content Security Policy (CSP): A Complete Guide for Developers

🛡️ Content Security Policy (CSP): A Complete Guide for Developers

2
Comments
3 min read
Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

Your SOC 2 Compliance Won't Stop Supply Chain Attacks (And I Have the Data to Prove It)

2
Comments
4 min read
HashGate - HMAC Authentication Implementation

HashGate - HMAC Authentication Implementation

Comments
7 min read
Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

Securing AI Agents: Why Traditional Identity Systems Fail and How to Build for AI

1
Comments
4 min read
Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Comments
2 min read
What is Customer Identity and Access Management? Benefits and Examples

What is Customer Identity and Access Management? Benefits and Examples

1
Comments
2 min read
The Hidden Dangers of Overlooking Digital Hygiene in 2025

The Hidden Dangers of Overlooking Digital Hygiene in 2025

1
Comments
2 min read
Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Comments
2 min read
Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

1
Comments
2 min read
Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Comments
2 min read
Why Developers Should Care About Access Control

Why Developers Should Care About Access Control

Comments
4 min read
Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Comments
8 min read
Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

4
Comments
4 min read
Cloak and Swagger: Hiding in Plain Sight on Social Networks

Cloak and Swagger: Hiding in Plain Sight on Social Networks

1
Comments
2 min read
loading...