DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How Many AI Tokens to Play a Game of Chess?

How Many AI Tokens to Play a Game of Chess?

Comments
3 min read
She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

She Shared Her Screen… and Her AWS Secret (Yes, she's a FANG)

8
Comments
2 min read
Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

Why the Future of AI Note Taking is Local, Offline, and Open Source: Taking Back Control of Your Meeting Data

4
Comments
5 min read
🚨 Monitoring in 2025: 6 Rules That Saved My Projects

🚨 Monitoring in 2025: 6 Rules That Saved My Projects

Comments
1 min read
Top 6 BoldSign Features That Make E-Signatures Effortless

Top 6 BoldSign Features That Make E-Signatures Effortless

3
Comments
4 min read
Securing Email with Cisco Email Security Appliance: The Essential Guide

Securing Email with Cisco Email Security Appliance: The Essential Guide

Comments
5 min read
8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

A Simple AWS-Powered Clinic Appointment System App Using Docker and SNS

Comments
3 min read
Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

Wazuh: The Open-Source Security Monitoring Solution Every Development Team Needs in 2025

1
Comments
5 min read
🔐 Secure Your Files with chattr +i in Linux

🔐 Secure Your Files with chattr +i in Linux

Comments
1 min read
JWT Authentication Deep Dive: Creation, Storage, and Verification

JWT Authentication Deep Dive: Creation, Storage, and Verification

1
Comments
4 min read
How does Authentication work & different types

How does Authentication work & different types

Comments
2 min read
Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

Avoid the Mistakes That Led to the NTT Breach: Secure Linux User Onboarding and Access Control

5
Comments
3 min read
IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

IngressNightmare: Critical Kubernetes Vulnerabilities Expose Clusters to Remote Takeover

Comments
3 min read
15 Laravel Security Best Practices You Should Follow in 2025

15 Laravel Security Best Practices You Should Follow in 2025

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.