DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Sorting encrypted data without decryption: a practical trick

Sorting encrypted data without decryption: a practical trick

Comments
5 min read
Node.js - Security Audit via Github Action to augment PR's

Node.js - Security Audit via Github Action to augment PR's

Comments
3 min read
Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)

Building Trust for AI Agents — ISM-X: A Privacy-Preserving Identity Layer (with demo)

Comments
1 min read
ZKP

ZKP

Comments
7 min read
Memahami Jenis-Jenis Metode Autentikasi dan Alur (Flow)-nya

Memahami Jenis-Jenis Metode Autentikasi dan Alur (Flow)-nya

Comments
3 min read
Policy as Code, Everywhere: How Casbin Makes Authorization Simple, Powerful, and Portable

Policy as Code, Everywhere: How Casbin Makes Authorization Simple, Powerful, and Portable

Comments
5 min read
First Steps into Darkness: My First Malware Analysis Experience

First Steps into Darkness: My First Malware Analysis Experience

Comments
3 min read
ShieldX - A Vietnamese developer's dream to make enterprise security accessible

ShieldX - A Vietnamese developer's dream to make enterprise security accessible

1
Comments
2 min read
My Journey into Programming: From Curiosity to Code

My Journey into Programming: From Curiosity to Code

Comments
1 min read
🚀 How I Deployed My Startup's Server Without Kubernetes or Docker (Yet)

🚀 How I Deployed My Startup's Server Without Kubernetes or Docker (Yet)

Comments
8 min read
Hexadecimal: The Secret Language of Networks (and MAC Addresses)

Hexadecimal: The Secret Language of Networks (and MAC Addresses)

1
Comments
2 min read
Getting Started with Spring Security: Securing Your First Spring Boot Application (Basic Auth)

Getting Started with Spring Security: Securing Your First Spring Boot Application (Basic Auth)

2
Comments
7 min read
Volant — Spin up real microVMs in 10 seconds

Volant — Spin up real microVMs in 10 seconds

Comments
2 min read
Lecciones aprendidas de la certificación AWS Security Specialty 🥇

Lecciones aprendidas de la certificación AWS Security Specialty 🥇

Comments
2 min read
🐳 Enterprise-Grade Containerization for Node.js Backends

🐳 Enterprise-Grade Containerization for Node.js Backends

Comments
5 min read
🔐 PCI DSS Compliance in Mobile Payment Systems

🔐 PCI DSS Compliance in Mobile Payment Systems

Comments
10 min read
The Secret to Secure Cloud Access from Restricted Regions: Reverse Proxy Everything

The Secret to Secure Cloud Access from Restricted Regions: Reverse Proxy Everything

Comments
3 min read
How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)

How to Secure Your ASP.NET Web API with JWT Bearer Authentication (Step-by-Step Guide)

Comments
10 min read
Difference Between SOC 1 and SOC 2: A Complete Guide

Difference Between SOC 1 and SOC 2: A Complete Guide

2
Comments
2 min read
🧭 Runbook: Como Rodar um Playbook Ansible com Pipeline CI/CD e SSH via Bastion

🧭 Runbook: Como Rodar um Playbook Ansible com Pipeline CI/CD e SSH via Bastion

Comments
5 min read
Your AI Chatbot Just Leaked Customer Data to OpenAI. Here’s How it Happened and How to Prevent it

Your AI Chatbot Just Leaked Customer Data to OpenAI. Here’s How it Happened and How to Prevent it

Comments
33 min read
🔎 Seraphix: The Secret Scanner Toolkit Built for Speed, Scale, and Bug Bounties

🔎 Seraphix: The Secret Scanner Toolkit Built for Speed, Scale, and Bug Bounties

Comments
3 min read
Beyond Cost: Lessons from our Migration to Hetzner

Beyond Cost: Lessons from our Migration to Hetzner

1
Comments
10 min read
AWS IAM ACCESS ANALYSIS & REPORTS

AWS IAM ACCESS ANALYSIS & REPORTS

1
Comments
3 min read
When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

When a Plugin Update Wiped Out Our Site — and Taught Us a Painful Lesson

Comments
2 min read
loading...