DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Boosting Network Monitoring with Guardius Ping Task

Boosting Network Monitoring with Guardius Ping Task

Comments
1 min read
Top 5 Web Security Scanners in 2025: Protect Your Digital Assets

Top 5 Web Security Scanners in 2025: Protect Your Digital Assets

1
Comments
3 min read
A New Day, a New Security Attack on npm…

A New Day, a New Security Attack on npm…

Comments
3 min read
What Are Game Servers and How Do They Work?

What Are Game Servers and How Do They Work?

Comments
3 min read
Silent Code: The Unseen Algorithms Reshaping Your Digital World

Silent Code: The Unseen Algorithms Reshaping Your Digital World

Comments
2 min read
Implementing Continuous Access Control with OpenID CAEP

Implementing Continuous Access Control with OpenID CAEP

1
Comments
4 min read
Securing Agentic AI Systems

Securing Agentic AI Systems

2
Comments
12 min read
Puzzles for Hacker (task only)

Puzzles for Hacker (task only)

Comments
6 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

API Access Control in Action: How I Protected My Team’s APIs from Unauthorized Access

2
Comments
3 min read
SSH Key Authentication in Linux

SSH Key Authentication in Linux

3
Comments
4 min read
CAPTCHA provider buyer’s guide 2025

CAPTCHA provider buyer’s guide 2025

Comments
7 min read
💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)

💎 ANN: oauth2 v2.0.16 w/ full E2E example (& Instagram Compat)

7
Comments 1
5 min read
Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

1
Comments
4 min read
Data Privacy in Web3: Meeting 2025 Consumer Expectation

Data Privacy in Web3: Meeting 2025 Consumer Expectation

1
Comments 1
6 min read
DNS Spoofing Explained: How Hackers Trick the Internet’s Phonebook

DNS Spoofing Explained: How Hackers Trick the Internet’s Phonebook

16
Comments
3 min read
Why DevOps Teams Overlook Dependency Analysis (and Why You Shouldn’t)

Why DevOps Teams Overlook Dependency Analysis (and Why You Shouldn’t)

1
Comments
2 min read
🐳 Docker Explained with a Food Truck 🍔

🐳 Docker Explained with a Food Truck 🍔

Comments
1 min read
Implementing Passkeys in Large‑Scale Web Applications

Implementing Passkeys in Large‑Scale Web Applications

Comments
6 min read
Security Risks and Improvement Strategies for Multi-Channel OTP Fallback

Security Risks and Improvement Strategies for Multi-Channel OTP Fallback

Comments
3 min read
Advanced Contract Patterns and Testing Strategies for AI-Safe Development

Advanced Contract Patterns and Testing Strategies for AI-Safe Development

Comments
12 min read
Security in CI/CD Pipelines

Security in CI/CD Pipelines

Comments
10 min read
API Security in Django: Approaches, Trade-offs, and Best Practices

API Security in Django: Approaches, Trade-offs, and Best Practices

Comments
6 min read
Bringing Blockchain-Grade Security to IoT and Edge Systems with nanoedge-pki

Bringing Blockchain-Grade Security to IoT and Edge Systems with nanoedge-pki

Comments
4 min read
secure-pubsub-bridge: End-to-End RSA Encryption for Google Cloud Pub/Sub

secure-pubsub-bridge: End-to-End RSA Encryption for Google Cloud Pub/Sub

Comments
2 min read
loading...