DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Testing MCP Servers: Exploring Prompt Injection and Security Risks

Testing MCP Servers: Exploring Prompt Injection and Security Risks

15
Comments 3
2 min read
Secure Your Spring API With JWT and MongoDB

Secure Your Spring API With JWT and MongoDB

11
Comments 2
13 min read
Dotenv files annoyed me into writing Polyenv

Dotenv files annoyed me into writing Polyenv

4
Comments 1
7 min read
How to create an AWS IAM EKS Cluster role to be used later

How to create an AWS IAM EKS Cluster role to be used later

Comments
1 min read
Create secure tunnels between Upsun projects with Chisel

Create secure tunnels between Upsun projects with Chisel

Comments
1 min read
The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

The AI Code Security Crisis: Why 45% of AI-Generated Code is Vulnerable

1
Comments
2 min read
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

Comments
4 min read
Outil de Cybersécurité du Jour - Aug 27, 2025

Outil de Cybersécurité du Jour - Aug 27, 2025

Comments
3 min read
The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

The Developer's Complete Guide to CIAM Providers in 2025: 30+ Platforms Analyzed

1
Comments
2 min read
Essential JWT Security Best Practices for Developers

Essential JWT Security Best Practices for Developers

18
Comments 6
6 min read
The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

The Ghost in the Machine: A Defender's Guide to Offline Security Testing with Blackglass_Suite

1
Comments
10 min read
Agentic AI in Cybersecurity: The Next Frontier for Human-Centric Defense

Agentic AI in Cybersecurity: The Next Frontier for Human-Centric Defense

Comments
3 min read
Connections and workflows updates in September

Connections and workflows updates in September

1
Comments
1 min read
Mastering Identity Management in Microsoft Entra ID: From Users to Roles

Mastering Identity Management in Microsoft Entra ID: From Users to Roles

6
Comments
3 min read
How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

How I Secured User File Access Using ACL and Chroot Jail: A Step-by-Step Guide

4
Comments 1
3 min read
Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Kubernetes Üzerinde RBAC ile Kullanıcı Olusturma ve Yetkilendirme

Comments
4 min read
Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

Performing Basic User Management Tasks in Microsoft Entra ID: A Step-by-Step Guide

6
Comments
3 min read
Using AI to build an AI Security Product

Using AI to build an AI Security Product

Comments
2 min read
Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

Security Debt in Smart Contracts - How Cutting Corners Now Creates Bigger Risks Later

2
Comments
3 min read
Building an Enterprise Data Access Layer: The Foundation

Building an Enterprise Data Access Layer: The Foundation

2
Comments
2 min read
Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Introducing SecureCheck: An Open-Source Security Scanner for Web Applications

Comments
2 min read
How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers

Comments
2 min read
How to Maintain Compliance and Security in Finance

How to Maintain Compliance and Security in Finance

Comments
2 min read
Enhancing Security in Apps Script

Enhancing Security in Apps Script

1
Comments
3 min read
🛡️ Content Security Policy (CSP): A Complete Guide for Developers

🛡️ Content Security Policy (CSP): A Complete Guide for Developers

2
Comments
3 min read
loading...