DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS IAM basics explained with real examples

AWS IAM basics explained with real examples

Comments
5 min read
I Built My Own Auth Server Instead of Reusing Firebase — Here’s What I Learned

I Built My Own Auth Server Instead of Reusing Firebase — Here’s What I Learned

3
Comments 2
2 min read
Your Proxy Should Only Allow Requests with a Custom Header — How Do You Do It in Apigee X?

Your Proxy Should Only Allow Requests with a Custom Header — How Do You Do It in Apigee X?

5
Comments
3 min read
Your Deployment Pipeline Is a Privileged Identity System

Your Deployment Pipeline Is a Privileged Identity System

Comments
11 min read
Prompt Injection Is the “Social Engineering” of AI Apps

Prompt Injection Is the “Social Engineering” of AI Apps

1
Comments 1
2 min read
Top 5 AI Gateways for Implementing Guardrails in AI Applications

Top 5 AI Gateways for Implementing Guardrails in AI Applications

1
Comments
4 min read
I Built a Chrome Extension That Scans Websites for Threats Using AI — Entirely On-Device

I Built a Chrome Extension That Scans Websites for Threats Using AI — Entirely On-Device

Comments
6 min read
Secrets in Pipelines Are an Architectural Smell

Secrets in Pipelines Are an Architectural Smell

Comments
10 min read
TIL: Using PTT and Cloudflare to Block Web Crawlers?

TIL: Using PTT and Cloudflare to Block Web Crawlers?

Comments
1 min read
Why I Built AIP: Identity Infrastructure for AI Agents

Why I Built AIP: Identity Infrastructure for AI Agents

Comments
4 min read
The $100K Mistake: How One Exposed API Key Cost a Startup Everything

The $100K Mistake: How One Exposed API Key Cost a Startup Everything

1
Comments
14 min read
NodeSecure hidden capability: mama

NodeSecure hidden capability: mama

Comments
2 min read
Modern DevSecOps Needs More Than One Tool: Secure SDLC Strategy

Modern DevSecOps Needs More Than One Tool: Secure SDLC Strategy

Comments
3 min read
Python Obfuscation: From Readable to Untraceable

Python Obfuscation: From Readable to Untraceable

1
Comments
1 min read
Mastering Kubernetes for DevSecOps: Secure and Scalable Container Orchestration

Mastering Kubernetes for DevSecOps: Secure and Scalable Container Orchestration

Comments 1
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.