DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
82% of Organizations Were Breached Through Containers

82% of Organizations Were Breached Through Containers

Comments
3 min read
Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones

Fundamentos de AppSec: Protegiendo el Corazón de tus Aplicaciones

Comments
4 min read
Secure Like a Pro: 10 Advanced Techniques in Symfony

Secure Like a Pro: 10 Advanced Techniques in Symfony

3
Comments 2
8 min read
WorkSafeBC style workflows with careful language and clear evidence limits

WorkSafeBC style workflows with careful language and clear evidence limits

Comments
4 min read
Build a Complete PKI from Scratch in Node.js

Build a Complete PKI from Scratch in Node.js

1
Comments
14 min read
🧱 Execution Is a System Boundary, Not a Feature

🧱 Execution Is a System Boundary, Not a Feature

1
Comments
1 min read
🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

🔐 AppSec desde los Protocolos: Cómo HTTP, Cookies y CORS Definen tu Superficie de Ataque

Comments
3 min read
Laravel Policies: Centralize Your Authorization and Keep Your Controllers Clean

Laravel Policies: Centralize Your Authorization and Keep Your Controllers Clean

1
Comments
3 min read
I Open-Sourced a Tool to Detect Weak JWT Secrets 🔐

I Open-Sourced a Tool to Detect Weak JWT Secrets 🔐

Comments
2 min read
AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security

AWS Resource Control Policies (RCPs) Explained: A Practical Guide to Resource-Level Security

1
Comments
4 min read
Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery

Troubleshooting EFS Mount Failures in EKS: The IAM Mount Option Mystery

Comments
3 min read
How to Integrate Vulnerability Scanning Into DevSecOps Workflows

How to Integrate Vulnerability Scanning Into DevSecOps Workflows

2
Comments
7 min read
Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners

Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners

Comments
1 min read
Trust No One: Implementing True End-to-End Encryption with Insertable Streams

Trust No One: Implementing True End-to-End Encryption with Insertable Streams

3
Comments
8 min read
The State of MCP Server Security in 2026 — 118 Findings Across 68 Packages

The State of MCP Server Security in 2026 — 118 Findings Across 68 Packages

Comments 2
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.