DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Emergency Server Recovery: A 4-Hour Race Against Time

Emergency Server Recovery: A 4-Hour Race Against Time

Comments
4 min read
Understanding Content Security Policy (CSP)

Understanding Content Security Policy (CSP)

Comments
9 min read
Análise de Vetores de Ataque em Arquitetura de Aplicações Web

Análise de Vetores de Ataque em Arquitetura de Aplicações Web

1
Comments
17 min read
AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

AzureAD 3.7: Dynamic credentials with Flexible Federated Identity

3
Comments
2 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Image Scanning Tools (Anchore, Clair)

Image Scanning Tools (Anchore, Clair)

Comments
6 min read
Cloak of Invisibility: Hiding from AI in Plain Sight

Cloak of Invisibility: Hiding from AI in Plain Sight

Comments
2 min read
Queen City Con 0x3: Hacking And Embracing Resiliency

Queen City Con 0x3: Hacking And Embracing Resiliency

Comments
8 min read
Vibe coding security checklist

Vibe coding security checklist

Comments 1
8 min read
Wallet UX Architecture Decisions: How to Choose the Right Model for Your App

Wallet UX Architecture Decisions: How to Choose the Right Model for Your App

Comments
3 min read
It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

It’s Time to End the Era of Signature-Based Malware Detection (Introducing SemanticsAV)

Comments
5 min read
Modern Authentication in 2025: OAuth2, MFA, and the Shift to Passwordless

Modern Authentication in 2025: OAuth2, MFA, and the Shift to Passwordless

Comments
6 min read
Guided Lab: Azure Storage with Customer-Managed Keys, Retention Policies & Encryption Scopes

Guided Lab: Azure Storage with Customer-Managed Keys, Retention Policies & Encryption Scopes

1
Comments
7 min read
Bridging Policy and Automation: Building a Compliant AWS Pipeline in a Regulated Environment

Bridging Policy and Automation: Building a Compliant AWS Pipeline in a Regulated Environment

1
Comments 1
2 min read
I Made a File That's Also Another File (And Your Mind is About to Break) 🤯

I Made a File That's Also Another File (And Your Mind is About to Break) 🤯

4
Comments
6 min read
From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

From Cloud Audit Logs to Real-Time Threat Detection with BigQuery and Chronicle SIEM

Comments 1
5 min read
Two Weeks Stuck on Authentication: My Headless API Journey

Two Weeks Stuck on Authentication: My Headless API Journey

1
Comments
2 min read
DevSecOps and Security-First Development Practices

DevSecOps and Security-First Development Practices

Comments
3 min read
Why Teams Need a Bridge Between DAST Tools and Human Pentesters

Why Teams Need a Bridge Between DAST Tools and Human Pentesters

1
Comments
4 min read
Cryptography in 2025: The Quantum Leap and the AI Arms Race

Cryptography in 2025: The Quantum Leap and the AI Arms Race

Comments
3 min read
Python For Exploit Development

Python For Exploit Development

Comments
7 min read
Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Introducing GuardScan: 100% Free, Privacy-First AI Code Review & Security Scanning CLI

Comments
3 min read
Creating production-ready authentication and authorization

Creating production-ready authentication and authorization

Comments
3 min read
Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Building an Air-Gapped AI Defense System in Python (No Cloud APIs)

Comments
1 min read
How to Secure RabbitMQ & Celery with TLS/SSL

How to Secure RabbitMQ & Celery with TLS/SSL

Comments
1 min read
loading...