DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Planning for ISO 27001 Certification? Here’s What the Cost Looks Like

Comments
4 min read
Rule of Two Piece

Rule of Two Piece

Comments 1
7 min read
Azure Backup & Disaster Recovery

Azure Backup & Disaster Recovery

Comments
8 min read
Week 2 Scripting Challenge: Log Parser

Week 2 Scripting Challenge: Log Parser

1
Comments
12 min read
AI Agent-Level Attacks & Autonomous Exploit Generation: Can AI Hack Itself?

AI Agent-Level Attacks & Autonomous Exploit Generation: Can AI Hack Itself?

Comments
4 min read
How to Start an RDP Session From macOS With Windows App

How to Start an RDP Session From macOS With Windows App

Comments
4 min read
🚀 Terraform Day 14: Hosting a Secure Static Website with S3 & CloudFront

🚀 Terraform Day 14: Hosting a Secure Static Website with S3 & CloudFront

Comments
2 min read
Improving Container Security with Docker Hardened Images

Improving Container Security with Docker Hardened Images

16
Comments
6 min read
Security isn’t just about code

Security isn’t just about code

Comments 1
1 min read
Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Securing High-Risk Zones: An Integrated RFID and Autonomous Drone Surveillance System

Comments
4 min read
What breaks trust in authentication UX

What breaks trust in authentication UX

2
Comments
3 min read
Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Tech Pulse: December 23, 2025 - AI, Cybersecurity & Development News Roundup

Comments 1
3 min read
When Your Users Are Bots, Not People

When Your Users Are Bots, Not People

Comments
3 min read
Trust Roles, Not Payments: How We're Building an Open Source Security Community

Trust Roles, Not Payments: How We're Building an Open Source Security Community

Comments
4 min read
Day 22 — Chained Attack (The Final Confrontation)

Day 22 — Chained Attack (The Final Confrontation)

3
Comments
2 min read
AWS simplified Cloudtrail events monitoring using Cloudwatch Logs

AWS simplified Cloudtrail events monitoring using Cloudwatch Logs

Comments
4 min read
Logistics Software Testing: How to Do Quality Assurance for Logistics

Logistics Software Testing: How to Do Quality Assurance for Logistics

Comments
13 min read
File Browser — Open-Source Web File Manager You Can Self-Host

File Browser — Open-Source Web File Manager You Can Self-Host

Comments
2 min read
Support is the weakest link in authentication (unless you design it not to be)

Support is the weakest link in authentication (unless you design it not to be)

3
Comments 3
3 min read
PCI-DSS Compliance Checklist for Android Apps

PCI-DSS Compliance Checklist for Android Apps

Comments
1 min read
Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Goodbye Hidden Fields: Modern CSRF Protection Without Tokens

Comments 1
3 min read
AI Code Review for Compliance : Benefits and Best Practices

AI Code Review for Compliance : Benefits and Best Practices

Comments
4 min read
A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫

A CI-Style Testing Tool for AI Correctness, Safety, and Cost, Introducing Orbit💫

Comments
1 min read
I Monkey-Patched Python to Stop AI Agents from Accessing Private Networks

I Monkey-Patched Python to Stop AI Agents from Accessing Private Networks

Comments 1
3 min read
Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Adversarial AI and Robustness Engineering: Attacks, Defenses, and Trust

Comments
6 min read
loading...