DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Introduction to SSH setup

Introduction to SSH setup

Comments
4 min read
Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

Continuous Delivery applied to Authorization with IAM Identity Center and AWS IAM Access Analyzer – Part 2

4
Comments
4 min read
Top 10 Tips with Code Examples: How to Secure Your C# Application

Top 10 Tips with Code Examples: How to Secure Your C# Application

15
Comments
3 min read
Data Validation Techniques

Data Validation Techniques

30
Comments
1 min read
Securing Rails application with Action Policy

Securing Rails application with Action Policy

Comments
4 min read
Security news weekly round-up - 20th September 2024

Security news weekly round-up - 20th September 2024

1
Comments
3 min read
Strengthen OpenSSH Security through Ansible and GitHub Actions

Strengthen OpenSSH Security through Ansible and GitHub Actions

2
Comments
6 min read
Geolocation fun with Gemini

Geolocation fun with Gemini

4
Comments
7 min read
Secure API Key Handling in Python Projects

Secure API Key Handling in Python Projects

2
Comments
2 min read
CORS (Cross-Origin Resource Sharing) 🌐

CORS (Cross-Origin Resource Sharing) 🌐

Comments
9 min read
Top 5 AI Models YOU Can Run Locally on YOUR Device! 🤯

Top 5 AI Models YOU Can Run Locally on YOUR Device! 🤯

598
Comments 48
6 min read
Flexible policy enforcement with Minder profile selectors

Flexible policy enforcement with Minder profile selectors

4
Comments
1 min read
The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

The Evolution of File Access Security in Android: Navigating Path Restrictions from Android 1.0 to Android 15

7
Comments
8 min read
A Concise Explanation of Dynamic Application Security Testing (DAST)

A Concise Explanation of Dynamic Application Security Testing (DAST)

Comments
2 min read
🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

🤖 End to end LLMOps Pipeline - Part 4 - Trivy 🤖

Comments
3 min read
Testing Authorization with Auth Analyzer in Burp Suite

Testing Authorization with Auth Analyzer in Burp Suite

9
Comments
5 min read
Critical LLM Security Risks and Best Practices for Teams

Critical LLM Security Risks and Best Practices for Teams

38
Comments
8 min read
The Easiest Network Attack for Beginners: ARP Spoofing

The Easiest Network Attack for Beginners: ARP Spoofing

Comments
5 min read
Implement mTLS on AWS ALB with Self-Signed Certificates

Implement mTLS on AWS ALB with Self-Signed Certificates

13
Comments 1
5 min read
Issue 62 of AWS Cloud Security Weekly

Issue 62 of AWS Cloud Security Weekly

Comments
2 min read
AuthenticationHandler in ASPNET

AuthenticationHandler in ASPNET

12
Comments 1
3 min read
Best Cyber Security Certifications for Cloud Security Experts

Best Cyber Security Certifications for Cloud Security Experts

Comments 1
4 min read
Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Mindful Machines: Deciphering AI TRiSM (Trust, Risk & Security Management)

Comments
5 min read
ACTING (like we care about) Security

ACTING (like we care about) Security

3
Comments
6 min read
Transaction Verification in Fintech Applications: A Step-By-Step Guide

Transaction Verification in Fintech Applications: A Step-By-Step Guide

2
Comments
6 min read
loading...