DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

A Clear Guide to AuthN, AuthZ, OIDC, OAuth and Their Role in Securing Applications

Comments
4 min read
How to Recover from Expired vCenter 7 (ESXI) Certificates: A Step-by-Step Guide 2025

How to Recover from Expired vCenter 7 (ESXI) Certificates: A Step-by-Step Guide 2025

Comments
2 min read
Setting Up Development, Testing, and Production Namespaces in Kubernetes: A Practical Guide 2025

Setting Up Development, Testing, and Production Namespaces in Kubernetes: A Practical Guide 2025

Comments
2 min read
Quick Cookie Management Tips

Quick Cookie Management Tips

Comments 1
3 min read
Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Unlocking Digital Safety: Must-Know Protocols to Protect Your Online World

Comments
3 min read
Understanding the STRIDE Function in Cybersecurity

Understanding the STRIDE Function in Cybersecurity

Comments
3 min read
AWS security and compliance

AWS security and compliance

Comments 1
1 min read
Top Infrastructure as Code Security Tools in 2025

Top Infrastructure as Code Security Tools in 2025

Comments
8 min read
Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

Como criar uma chave GPG e contribuir de maneira segura para projetos open-source

6
Comments
3 min read
Post-Quantum Cryptography

Post-Quantum Cryptography

Comments
2 min read
Secrets Management Best Practices for Team Collaboration

Secrets Management Best Practices for Team Collaboration

1
Comments
2 min read
How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

How Reachability Analysis 🔎 can help with open source vulnerabilities mess (Coana as an example)

Comments
10 min read
How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

How to add Dahua video devices on third-party video management software platform SVMS Pro by Dahua private protocol Register?

Comments
2 min read
Tech innovator

Tech innovator

Comments
1 min read
Granting User Access to Unraid Shares

Granting User Access to Unraid Shares

Comments
2 min read
Creating a User in Unraid for Secure Access

Creating a User in Unraid for Secure Access

Comments
1 min read
Compliance Tools for Cloud Environments

Compliance Tools for Cloud Environments

1
Comments
4 min read
Let's get messy

Let's get messy

Comments
3 min read
Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Lessons Learned #4: One error message could expose all your data (FileSender CVE-2024–45186)

Comments
5 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc đội nhóm

Comments
4 min read
Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Cách giảm thiểu nguy cơ rò rỉ secrets khi làm việc với đội nhóm

Comments
4 min read
Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

Advanced Docker Scout: Real-World Implementation Patterns and Best Practices

1
Comments
3 min read
Diving into Bug Bounty Hunting: My Journey Begins with Resources and Tips for Beginners

Diving into Bug Bounty Hunting: My Journey Begins with Resources and Tips for Beginners

Comments
4 min read
NowiPass

NowiPass

Comments
1 min read
Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Lessons Learned #3: Is your random UUID really random? (Account takeover with the sandwich 🥪 attack)

Comments
7 min read
loading...